Ticket-based handoff authentication for wireless mesh networks

被引:20
作者
Xu, Li [1 ,2 ]
He, Yuan [1 ]
Chen, Xiaofeng [3 ]
Huang, Xinyi [1 ]
机构
[1] Fujian Normal Univ, Sch Math & Comp Sci, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350108, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Key Lab Broadband Wireless Commun & Sensor Networ, Nanjing, Jiangsu, Peoples R China
[3] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian 710071, Peoples R China
基金
中国国家自然科学基金;
关键词
Fast handoff; Re-authentication; Ticket; Lightweight; Wireless mesh networks; PRIVACY PRESERVATION; SCHEME;
D O I
10.1016/j.comnet.2014.08.009
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the convenience of deployment and maintenance, wireless mesh networks (WMNs) have emerged as key techniques to support large-scale wireless coverage in both industrial and academic fields. Secure and seamless handoff is important to support mobility in WMNs. There are many existing works can be adopted to reduce the handoff latency, However, all these schemes require modifications to the original authentication protocols (e.g., different key architectures or trust relationships). In this paper, we propose a design based on ticket to achieve fast and secure handoff in WMNs. By pre-distributing the tickets to mesh client, the mesh client and the target mesh router can authenticate each other and establish temporary connection. Our scheme can be regarded as a supplementary specialized for handoff in WMNs, and no modification is required to the IEEE 802.1x authentication architecture. We achieve seamless handoff by using symmetric key operations and eliminating the involvement of a third party, which significantly reduces the computation and communication overheads. The security and performance analysis shows that our scheme is efficient in terms of security, computation overhead and handoff latency. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:185 / 194
页数:10
相关论文
共 24 条
[1]   Wireless mesh networks: a survey [J].
Akyildiz, IF ;
Wang, XD ;
Wang, WL .
COMPUTER NETWORKS, 2005, 47 (04) :445-487
[2]  
[Anonymous], 1992, MD5 MESSAGE DIGEST A
[3]  
[Anonymous], 2003, IEEE TRIAL USE RECOM
[4]  
Ben Salem N, 2006, IEEE WIREL COMMUN, V13, P50, DOI 10.1109/MWC.2006.1632480
[5]  
Brik V., 2005, PROC ACM INTERNET ME, P299
[6]   An Uniform Handover Authentication between E-UTRAN and Non-3GPP Access Networks [J].
Cao, Jin ;
Ma, Maode ;
Li, Hui .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2012, 11 (10) :3644-3650
[7]   A simple and robust handover authentication between HeNB and eNB in LTE networks [J].
Cao, Jin ;
Li, Hui ;
Ma, Maode ;
Zhang, Yueyu ;
Lai, Chengzhe .
COMPUTER NETWORKS, 2012, 56 (08) :2119-2131
[8]   A Handover Authentication Using Credentials Based on Chameleon Hashing [J].
Choi, Jaeduck ;
Jung, Souhwan .
IEEE COMMUNICATIONS LETTERS, 2010, 14 (01) :54-56
[9]  
Daemen Joan, 2020, Information Security and Cryptography, V2nd
[10]   A Novel Group-Based Handover Authentication Scheme with Privacy Preservation for Mobile WiMAX Networks [J].
Fu, Anmin ;
Lan, Shaohua ;
Huang, Bo ;
Zhu, Zhenchao ;
Zhang, Yuqing .
IEEE COMMUNICATIONS LETTERS, 2012, 16 (11) :1744-1747