2015
DOI: 10.1002/cpe.3544
|View full text |Cite
|
Sign up to set email alerts
|

Improved handover authentication and key pre‐distribution for wireless mesh networks

Abstract: SUMMARYTicket-based authentication is a critical technology to secure wireless mesh networks (WMN), which enable efficient communication among laptops, cell phones and other wireless devices. In this paper, we provide a new design of handoff authentication for WMN to reduce the delay caused by handoff. Our major improvement is on the key pre-distribution for handoff authentication. We apply the attribute-based encryption to encrypt key pre-distribution messages for neighbor mesh routers. As a result, key pre-d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 22 publications
(57 reference statements)
0
9
0
Order By: Relevance
“…(4) The session key is indistinguishable with a random number. (5) When A has obtained the secret key in the mobile device, the probability of A knew the password is negligible.…”
Section: Security Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…(4) The session key is indistinguishable with a random number. (5) When A has obtained the secret key in the mobile device, the probability of A knew the password is negligible.…”
Section: Security Modelmentioning
confidence: 99%
“…However, limited resources (e.g. Computational ability, memory, battery capacity) and communications (e.g.Low bandwidth and security) have impeded the qualities of mobile services [1,5]. Cloud computing as a network-based infrastructure provides computing resources such as operating systems, storage, networks, hardware, databases, and even entire software applications to users as on-demand fashion [6][7][8].…”
Section: Introductionmentioning
confidence: 99%
“…In this section, we list the common security requirements and threats [ 2 , 9 , 11 17 , 22 , 28 , 30 – 46 , 44 – 46 ], along with the proof that the proposed protocol can satisfy those requirements and withstand those threats. We shall compare with some similar protocols including Li et al’s scheme [ 22 ] and Yang et al’s scheme [ 45 ]. Yang et al’s scheme is a follow-up study of Li et al’s scheme.…”
Section: Security Analysismentioning
confidence: 99%
“…In this section, we shall analyze the performance of the proposed handover authentication scheme by showing how it compares with some similar protocols including EAP-TLS [ 47 ], Li et al’s scheme [ 22 ], and Yang et al’s scheme [ 45 ]. EAP-TLS is a popular authentication protocol for IEEE 802.11-based wireless networks and represents the multi-hop handover authentication approach.…”
Section: Performance Analysismentioning
confidence: 99%
“…Yang et al . provide a new design on handover authentication in the wireless mesh network through an improved key predistribution.…”
mentioning
confidence: 99%