A Blockchain-Based Authentication Protocol for WLAN Mesh Security Access

被引:34
作者
Jiang, Xin [1 ]
Liu, Mingzhe [1 ]
Yang, Chen [1 ]
Liu, Yanhua [1 ]
Wane, Ruili [2 ]
机构
[1] Chengdu Univ Technol, State Key Lab Geohazard Prevent & Geoenvironm Pro, Chengdu, Sichuan, Peoples R China
[2] Massey Univ, Inst Nat & Math Sci, Auckland, New Zealand
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2019年 / 58卷 / 01期
关键词
WLAN mesh; block chain; authentication protocol; public ledger; WIRELESS; NETWORKS;
D O I
10.32604/cmc.2019.03863
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to deploy a secure WLAN mesh network, authentication of both users and APs is needed, and a secure authentication mechanism should be employed. However, some additional configurations of trusted third party agencies are still needed on-site to deploy a secure authentication system. This paper proposes a new block chain-based authentication protocol for WLAN mesh security access, to reduce the deployment costs and resolve the issues of requiring key delivery and central server during IEEE 802.11X authentication. This method takes the user's authentication request as a transaction, considers all the authentication records in the mesh network as the public ledger and realizes the effective monitoring of the malicious attack. Finally, this paper analyzes the security of the protocol in detail, and proves that the new method can solve the dependence of the authentication node on PKI and CA.
引用
收藏
页码:45 / 59
页数:15
相关论文
共 30 条
[1]   Software-defined wireless mesh networks for internet access sharing [J].
Abujoda, Ahmed ;
Dietrich, David ;
Papadimitriou, Panagiotis ;
Sathiaseelan, Arjuna .
COMPUTER NETWORKS, 2015, 93 :359-372
[2]  
[Anonymous], 1983, COMMUN ACM, DOI DOI 10.1145/357980.358017
[3]  
[Anonymous], SECURITY COMMUNICATI
[4]   Zerocash: Decentralized Anonymous Payments from Bitcoin [J].
Ben-Sasson, Eli ;
Chiesa, Alessandro ;
Garmant, Christina ;
Green, Matthew ;
Miers, Ian ;
Tromer, Eran ;
Virza, Madars .
2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, :459-474
[5]   NONINTERACTIVE ZERO-KNOWLEDGE [J].
BLUM, M ;
DESANTIS, A ;
MICALI, S ;
PERSIANO, G .
SIAM JOURNAL ON COMPUTING, 1991, 20 (06) :1084-1118
[6]  
Choumas K, 2014, IEEE INT CONF SENS, P486, DOI 10.1109/SAHCN.2014.6990387
[7]   Performance Analysis for IEEE 802.11s Wireless Mesh Network in Smart Grid [J].
Deng, Xiaoheng ;
He, Tingting ;
He, Lifang ;
Gui, Jinsong ;
Peng, Qionglin .
WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (01) :1537-1555
[8]  
Dobbertin H., 1996, Fast Software Encryption. Third International Workshop Proceedings, P71
[9]   RIPEMD with two-round compress function is not collision-free [J].
Dobbertin, H .
JOURNAL OF CRYPTOLOGY, 1997, 10 (01) :51-69
[10]  
Egners A., 2014, 38 ANN IEEE C LOC CO, V2014, P340