An anonymous batch handover authentication protocol for big flow wireless mesh networks

被引:9
作者
Wang, Dongcheng [1 ,2 ]
Xu, Li [1 ,2 ]
Wang, Feng [1 ,2 ]
Xu, Qikui [3 ]
机构
[1] Fujian Normal Univ, Sch Math & Informat, Fuzhou, Fujian, Peoples R China
[2] Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou, Fujian, Peoples R China
[3] Univ Sydney, Fac Sci, Sydney, NSW, Australia
基金
中国国家自然科学基金;
关键词
Wireless mesh networks; Handover authentication; Privacy-preserving; Bath authentication;
D O I
10.1186/s13638-018-1217-z
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless mesh network (WMN), as a new generation of wireless network technology, has raised increasing concerns in recent years. Due to the strong mobility nature of the clients in WMNs, the handover events frequently occur. Therefore, taking into consideration the openness of the wireless communication channel, the handover authentication protocols for WMNs have to be both efficient and secure, which remains a challenge. In this paper, an anonymous batch handover authentication protocol is proposed using group signature technique to pre-distribute handover keys. Unlike existing protocols based on group signature, the proposed protocol does not involve group signature correlation operations in the handover authentication phase, hence achieving a better performance.
引用
收藏
页数:8
相关论文
共 50 条
[31]   Securing Wireless Mesh Networks with Ticket-Based Authentication [J].
Qazi, Shams ;
Mu, Yi ;
Susilo, Willy .
ICSPCS: 2ND INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS, PROCEEDINGS, 2008, :746-755
[32]   Ticket-based handoff authentication for wireless mesh networks [J].
Xu, Li ;
He, Yuan ;
Chen, Xiaofeng ;
Huang, Xinyi .
COMPUTER NETWORKS, 2014, 73 :185-194
[33]   A Dynamic and Reliable Mesh Routing Protocol for Wireless Mesh Networks (DRMRP) [J].
Omari, Ahmed H. ;
Khrisat, Ala'a H. .
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (04) :16-21
[34]   Identity-based Handover Authentication Scheme without Pairing or Wireless Networks [J].
Huo, Shiwei ;
Guo, Shengming ;
Tian, Balin ;
Liu, Shaojun .
2020 IEEE CONFERENCE ON TELECOMMUNICATIONS, OPTICS AND COMPUTER SCIENCE (TOCS), 2020, :206-208
[35]   Lightweight handover authentication with location privacy-preserving in mobile wireless networks [J].
Liu, Ling ;
Quan, Hanyu ;
Liu, Xuefeng ;
Zhang, Yuqing .
INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2015, 7 (3-4) :280-288
[36]   A new trusted roaming protocol in wireless mesh networks [J].
Xiao, Peng ;
He, Jingsha ;
Chen, Yunli ;
Fu, Yingfang .
INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2013, 14 (02) :109-119
[37]   An Efficient and Reliable Routing Protocol for Wireless Mesh Networks [J].
Sen, Jaydip .
COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2010, PT 3, PROCEEDINGS, 2010, 6018 :246-257
[38]   A Secure and Reliable Routing Protocol for Wireless Mesh Networks [J].
黄仁俊 ;
萧宇凯 .
JournalofShanghaiJiaotongUniversity(Science), 2014, 19 (04) :466-475
[39]   A quality based routing protocol for wireless mesh networks [J].
Pal, Amitangshu ;
Nasipuri, Asis .
PERVASIVE AND MOBILE COMPUTING, 2011, 7 (05) :611-626
[40]   A secure and reliable routing protocol for wireless mesh networks [J].
Hwang R.-J. ;
Hsiao Y.-K. .
Journal of Shanghai Jiaotong University (Science), 2014, 19 (4) :466-475