Fast certificate-based authentication scheme in multi-operator maintained wireless mesh networks

被引:3
作者
Buttyan, Levente [1 ]
Dora, Laszlo [1 ]
Martinelli, Fabio [2 ]
Petrocchi, Marinella [2 ]
机构
[1] Budapest Univ Technol & Econ, Lab Cryptog & Syst Secur CrySyS, Budapest, Hungary
[2] CNR, Natl Res Council, IIT, I-56100 Pisa, Italy
关键词
Mesh networks; Authentication; EAP; Provable security;
D O I
10.1016/j.comcom.2010.01.014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we consider QoS aware mesh networks that are maintained by multiple operators and they cooperate in the provision of networking services to the mesh clients. In order to support mobile users and seamless handover between the access points, the authentication delay has to be reduced. Many proposed fast authentication schemes rely on trust models that are not appropriate in a multi-operator environment. In this paper, we propose two certificate-based authentication schemes such that the authentication is performed locally between the access point and the mesh client. We assume that the access point is always a constrained device, and we propose different mechanisms for mesh clients with different computational performance. For constrained devices, we propose a mechanism where weak keys are used for digital signatures to decrease the latency of the authentication. The authenticity of the weak keys are provided by short-term certificates issued by the owner of the key. The short-term certificate has the digital signature generated by the owner's long-term key. We prove formally that the use of our weak key mechanism on the mesh client side is as secure as the use of some stronger keys. We perform a detailed performance evaluation on our proof-of-concept implementation, and we also compare our solution to the current standard methods. (C) 2010 Elsevier B.V. All rights reserved.
引用
收藏
页码:907 / 922
页数:16
相关论文
共 50 条
[41]   A Privacy Preserving Authentication Scheme for Roaming in IoT-Based Wireless Mobile Networks [J].
Alzahrani, Bander A. ;
Chaudhry, Shehzad Ashraf ;
Barnawi, Ahmed ;
Al-Barakati, Abdullah ;
Alsharif, Mohammed H. .
SYMMETRY-BASEL, 2020, 12 (02)
[42]   A novel re-authentication scheme based on tickets in wireless local area networks [J].
Li, Guangsong ;
Ma, Jianfeng ;
Jiang, Qi ;
Chen, Xi .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2011, 71 (07) :906-914
[43]   A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth [J].
Qi Jiang ;
Xinxin Lian ;
Chao Yang ;
Jianfeng Ma ;
Youliang Tian ;
Yuanyuan Yang .
Journal of Medical Systems, 2016, 40
[44]   Fast and Secure Handover Authentication Scheme Based on Ticket for WiMAX and WiFi Heterogeneous Networks [J].
Fu, Anmin ;
Zhang, Gongxuan ;
Zhu, Zhenchao ;
Zhang, Yuqing .
WIRELESS PERSONAL COMMUNICATIONS, 2014, 79 (02) :1277-1299
[45]   Fast and Secure Handover Authentication Scheme Based on Ticket for WiMAX and WiFi Heterogeneous Networks [J].
Anmin Fu ;
Gongxuan Zhang ;
Zhenchao Zhu ;
Yuqing Zhang .
Wireless Personal Communications, 2014, 79 :1277-1299
[46]   A secure three-factor authentication scheme for multi-gateway wireless sensor networks based on elliptic curve cryptography [J].
Dai, Cong ;
Xu, Zhongwei .
AD HOC NETWORKS, 2022, 127
[47]   A Secure and Efficient Password-Based User Authentication Scheme for Hierarchical Wireless Sensor Networks [J].
Vorugunti, Chandra Sekhar ;
Sarvabhatla, Mrudula .
PROCEEDINGS OF NINTH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND SENSOR NETWORKS (WCSN 2013), 2014, 299 :245-259
[48]   An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks [J].
Das, Ashok Kumar ;
Sutrala, Anil Kumar ;
Kumari, Saru ;
Odelu, Vanga ;
Wazid, Mohammad ;
Li, Xiong .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) :2070-2092
[49]   A secure biometric based multi-server authentication scheme for social multimedia networks [J].
Shehzad Ashraf Chaudhry .
Multimedia Tools and Applications, 2016, 75 :12705-12725