Anonymous authentication scheme based on identity-based proxy group signature for wireless mesh network

被引:0
作者
Tianhan Gao
Fangting Peng
Nan Guo
机构
[1] Software College,
[2] Northeastern University,undefined
来源
EURASIP Journal on Wireless Communications and Networking | / 2016卷
关键词
WMN; Access authentication; Privacy preserving; Proxy group signature; Certificate-based signature;
D O I
暂无
中图分类号
学科分类号
摘要
Access security is the key obstacle of the rapid popularization of wireless mesh network (WMN). We suggest the proxy group signature scheme based on identity in this paper. This scheme is combined with proxy group signature and identity-based group signature, based on designated hierarchical proxy architecture for WMN. An anonymous mutual authentication scheme is thus achieved, which not only simplifies the complex management of PKI but also guarantees anonymous authentication and owns high handover authentication efficiency. Performance and security analysis show that the scheme in this paper is efficient and resilient to a series of security and anonymity attacks.
引用
收藏
相关论文
共 40 条
[1]  
Wang Z(2011)A unified security framework for multi-domain wireless mesh networks [J] Lect. Notes Comput. Sci 7043 319-329
[2]  
Maode Ma(2014)Security in wireless ad-hoc networks - A survey [J] Int. J. Comput. Commun 51 1-20
[3]  
Liu W(2014)PPS: A Privacy-Preserving Security Scheme for Multi-operator Wireless Mesh Networks with Enhanced User Experience [J] Sci. Inf. Syst 11 975-999
[4]  
Wei X(2009)A Wireless mesh network authentication method based on identity based signature [C] International Conference on Wireless Communications, NETWORKING and Mobile Computing 46 1-4
[5]  
Di Pietro R(2009)Anonymous communication in wireless mesh network[C] Comput. Intell. Secur. Int. Conf. IEEE 2 416-420
[6]  
Guarino S(2008)Proxy group signature: a new anonymous proxy signature scheme[C] International Conference on Machine Learning and Cybernetics 3 1369-1373
[7]  
Verdeb NV(2005)An ID-based group signature scheme [J] Comput. Sci 32 69-71
[8]  
Domingo-Ferrerc J(2012)Access authentication for HMIPv6 with node certificate and identity-based hybrid scheme[J] J. Softw 23 2465-2480
[9]  
Gao T(2015)Proposal DNP3 protocol simulation on NS-2 in IEEE 802.11g wireless network ad hoc over TCP/IP in smart grid applications [C] Innovative Smart Grid Technologies 3 25-31
[10]  
Guo N(2012)Routing protocol based on energy aware in ad hoc network[J] J. Commun 33 9-16