2019
DOI: 10.32604/cmc.2019.03863
|View full text |Cite
|
Sign up to set email alerts
|

A Blockchain-Based Authentication Protocol for WLAN Mesh Security Access

Abstract: In order to deploy a secure WLAN mesh network, authentication of both users and APs is needed, and a secure authentication mechanism should be employed. However, some additional configurations of trusted third party agencies are still needed on-site to deploy a secure authentication system. This paper proposes a new block chain-based authentication protocol for WLAN mesh security access, to reduce the deployment costs and resolve the issues of requiring key delivery and central server during IEEE 802.11X authe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 54 publications
(27 citation statements)
references
References 15 publications
0
27
0
Order By: Relevance
“…The new upcoming WLAN devices will obviously follow the backward compatibility towards WPA2. Thus, researchers can still target to test the implementation of 802.11i with the novel ideas like MIC reduction, 4-way handshake reduction and blockchain application in WLANs [33]. In wireless medium, per frame lightweight authentication mechanisms will prove an edge and in future, researchers may consider developing such solutions.…”
Section: Discussionmentioning
confidence: 99%
“…The new upcoming WLAN devices will obviously follow the backward compatibility towards WPA2. Thus, researchers can still target to test the implementation of 802.11i with the novel ideas like MIC reduction, 4-way handshake reduction and blockchain application in WLANs [33]. In wireless medium, per frame lightweight authentication mechanisms will prove an edge and in future, researchers may consider developing such solutions.…”
Section: Discussionmentioning
confidence: 99%
“…Due to the problem of certificate management in CA authentication system, researchers have conducted extensive research on identity-based cryptography (IBC). The authentication protocol proposed by Jiang et al uses the identity based cryptosystem, which takes the user's identity as the public key, does not need to store certificates, and simplifies the network configuration [26]. Li et al proposed a certificate-based wireless mesh network cross-domain authentication key protocol to implement mutual authentication and key exchange protocols between users [27].…”
Section: Centralized Cross-domain Authentication Schemementioning
confidence: 99%
“…Jiang et al proposed a new blockchain-based WLAN mesh network security access scheme authentication protocol, which solves the problem of requiring key delivery and requiring a central server in IEEE 802.11i and IEEE 802.11s authentication processes. The method treats the user's authentication request as a transaction and treats all the authentication records in the mesh network as a public ledger to effectively monitor malicious attacks [34]. The above references show that blockchain technology and smart contracts can be applied to the IoT environment, and can increase security without introducing a huge overhead, so it is feasible to apply it to the Wi-Fi network authentication of IoT devices.…”
Section: Related Workmentioning
confidence: 99%