Scalable Authentication Protocol for Wireless Mesh Network Access

被引:0
|
作者
Wang Ze [1 ]
Wang Qi [1 ]
Liu Wenju [1 ]
Ke Yongzhen [1 ]
机构
[1] Tianjin Polytech Univ, Comp Sci & Technol Inst, Tianjin, Peoples R China
关键词
wireless mesh network; access control; scalability; authentication;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
According to the problem that existing accessing authentication and protocols of wireless mesh network which may not guarantee to adapt different authentication agreement and the different underlying communicate infrastructure By using aspect oriented programming, dependency injection and soft plug-in technologies, we design a new access method of wireless mesh network which satisfy scalability This method realize the scalability of authentication protocol and consultations of keys and various physical networks Reflect attack counteraction and perfect forward privacy are provided in proposed authentication and key exchange protocols.
引用
收藏
页码:3051 / 3054
页数:4
相关论文
共 50 条
  • [1] An access authentication protocol for trusted handoff in wireless mesh networks
    Xiao, Peng
    He, Jingsha
    Fu, Yingfang
    COMPUTER STANDARDS & INTERFACES, 2014, 36 (03) : 480 - 488
  • [2] an Anycast Routing Protocol for Wireless Mesh Access Network
    Song Ling
    Xia Zheng-bing
    2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL II, 2009, : 82 - +
  • [3] A Secure Scalable Authentication Protocol for Access Network Communications using ECC
    Patel, Suyash
    Dua, Amit
    Kumar, Neeraj
    2021 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2021,
  • [4] An Efficient and Scalable Re-authentication Protocol over Wireless Sensor Network
    Kim, Jangseong
    Baek, Joonsang
    Shon, Taeshik
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2011, 57 (02) : 516 - 522
  • [5] An Efficient Authentication Protocol for Wireless Mesh Networks
    Zhai, Peng
    He, Jingsha
    Zhu, Nafei
    He, Peng
    Liang, Yao
    JOURNAL OF WEB ENGINEERING, 2020, 19 (7-8): : 1193 - 1212
  • [6] Anonymity handover authentication protocol based on group signature for wireless Mesh network
    Su B.-T.
    Xu L.
    Wang F.
    Lin Z.-X.
    2016, Editorial Board of Journal on Communications (37): : 174 - 179
  • [7] Time behaviour and network encumbrance due to authentication in wireless mesh access networks
    Roos, Andreas
    Wieland, Sabine
    Schwarzbacher, Andreas Th.
    Xu, Bangnan
    2007 IEEE 65TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-6, 2007, : 1219 - 1223
  • [8] A SCALABLE ROUTING PROTOCOL FOR WIRELESS MESH NETWORKS
    Kocaoglu, Ramazan
    Akcayol, M. Ali
    JOURNAL OF THE FACULTY OF ENGINEERING AND ARCHITECTURE OF GAZI UNIVERSITY, 2012, 27 (04): : 891 - 899
  • [9] A Novel Identity Authentication Scheme of Wireless Mesh Network Based on Improved Kerberos Protocol
    Li, Min
    Lv, Xin
    Song, Wei
    Zhou, Wenhuan
    Qi, Rongzhi
    Su, Huaizhi
    PROCEEDINGS OF THIRTEENTH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS TO BUSINESS, ENGINEERING AND SCIENCE, (DCABES 2014), 2014, : 190 - 194
  • [10] A novel authentication protocol for wireless access security
    Wan C.
    Hu A.
    Zhang J.
    Journal of Convergence Information Technology, 2010, 5 (08) : 22