An authentication method for fast handoff in WLAN mesh networks

被引:0
|
作者
Peng Q. [1 ]
Pei Q. [1 ]
Pang L. [1 ]
Ma J. [1 ]
机构
[1] Ministry of Education Key Laboratory of Computer Networks and Information Security, Xidian University, Xi'an
关键词
Fast handoff authentication; Key predistribution; Neighbor graph; Network security; WLAN Mesh networks;
D O I
10.3969/j.issn.1671-7775.2010.04.018
中图分类号
学科分类号
摘要
The security problem of fast handoffs in WLAN mesh networks with mobile mesh access point (MAP) was analyzed. Based on the neighbor graph fast handover method and matrix-based key pre-distribution scheme, an authentication scheme for fast handoff was proposed. The scheme is suitable to the WLAN mesh networks with mobile MAP. Based on Canetti-Krawczyk model, the improved 4-way handshake protocol in the scheme was analyzed. And computation overhead and memory cost were evaluated. The results show that it is SK-secure in UM if the pseudorandom function and MAC function in use are secure against chosen message attacks. The performance shows that the proposed scheme has less computation overhead and memory cost.
引用
收藏
页码:458 / 463
页数:5
相关论文
共 10 条
  • [1] Mishra A., Shin M.H., Petroni N.L., Et al., Proactive key distribution using neighbor graphs, IEEE Wireless Communications, 11, 1, pp. 26-36, (2004)
  • [2] Pack S., Jung H., Kwon T., Et al., SNC: A selective neighbor caching scheme for fast handoff in IEEE 802.11 wireless networks, ACM Mobile Computing and Communications Review, 9, 4, pp. 39-49, (2005)
  • [3] IEEE standard 802.11r. Part 11: Wireless LAN medium access control (MAC) and physical layer(PHY) specifications, amendment 2: Fast basic service set(BSS) transition, (2005)
  • [4] Hur J., Park C., Yoon H., An efficient pre-authentication scheme for IEEE 802.11-based vehicular networks, Proceedings of Advances in Information and Computer Security-Second International Workshop on Security, pp. 121-136, (2007)
  • [5] Komarova M., Riguidel M., Hecker A., Fast re-authentication protocol for inter-domain roaming, Proceedings of the 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, pp. 1-5, (2007)
  • [6] Li C.S., Tseng Y.C., Chao H.C., Et al., A neighbor caching mechanism for handoff in IEEE 802.11 wireless networks, Journal of Supercomputing, 45, 1, pp. 1-14, (2008)
  • [7] Kassab M., Bonnin J.M., Belghith A., Fast and Secure handover in WLANs: An evaluation of the signaling overhead, Proceedings of 5th IEEE Consumer Communications and Networking Conference, pp. 770-775, (2008)
  • [8] Du W.L., Deng J., Han Y., Et al., A pairwise key pre-distribution scheme for wireless sensor networks, Proceedings of 10th ACM Conference on Computer and Communications Security, pp. 42-51, (2003)
  • [9] Canetti R., Krawczyk H., Analysis of key-exchange protocol and their use for building secure channels, Proceedings of Eurocrypt'01, LNCS, 2045, pp. 453-474, (2001)
  • [10] Zhang F., Ma J.F., Moon S., The security proof of a 4-way handshake protocol in IEEE 802.11i, Proceedings of International Conference on Computational Intelligence and Security, LNCS, 3802, pp. 488-493, (2005)