A New Wireless Mesh Network Authentication Scheme Based on Threshold Method

被引:0
|
作者
Yang, Yatao [1 ]
Gu, Yonghao
Tan, Xi
Ma, Lina [1 ]
机构
[1] Beijing Elect Sci & Technol Inst, Beijing 100070, Peoples R China
关键词
Wireless mesh network; authentication; threshold method; network security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Access authentication is one of the secure issues which are eager to be resolved in wireless mesh networking. This paper proposes new wireless mesh network authentication architecture based on threshold signature technology. First, we point out the weakness of single authentication server and the security risks of traditional AAA authentication method. Then we design a new authentication system with multiple authentication servers: N authentication servers (AS) compose a authentication server group, only if t or more than t authentication servers allow a certain mobile subscriber require to access to the network, this subscriber can join in the network. This approach solves the deficiencies of single authentication server and guarantees the whole security of the authentication systems in mesh network.
引用
收藏
页码:2260 / 2265
页数:6
相关论文
共 50 条
  • [1] A Wireless Mesh Network Authentication Method based on Identity Based Signature
    Liu Wenju
    Shang Yuzhen
    Wang Ze
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 3026 - 3029
  • [2] Anonymous Authentication Scheme based on Proxy Group Signature for Wireless MESH Network
    Gao, Tianhan
    Miao, Qidi
    Guo, Nan
    2014 EIGHTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS), 2014, : 533 - 537
  • [3] Improved Cross Authentication Model Based on Threshold Method in Wireless Network
    Yang, Yatao
    Pan, Shaoming
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2009, 5 (01): : 86 - 86
  • [4] A PKI Based Mesh Router Authentication Scheme to Protect from Malicious Node in Wireless Mesh Network
    Lee, Kwang Hyun
    Hong, Choong Seon
    MANAGEMENT ENABLING THE FUTURE INTERNET FOR CHANGING BUSINESS AND NEW COMPUTING SERVICES, PROCEEDINGS, 2009, 5787 : 405 - 413
  • [5] A Novel Identity Authentication Scheme of Wireless Mesh Network Based on Improved Kerberos Protocol
    Li, Min
    Lv, Xin
    Song, Wei
    Zhou, Wenhuan
    Qi, Rongzhi
    Su, Huaizhi
    PROCEEDINGS OF THIRTEENTH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS TO BUSINESS, ENGINEERING AND SCIENCE, (DCABES 2014), 2014, : 190 - 194
  • [6] Anonymous authentication scheme based on identity-based proxy group signature for wireless mesh network
    Gao, Tianhan
    Peng, Fangting
    Guo, Nan
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2016,
  • [7] Anonymous authentication scheme based on identity-based proxy group signature for wireless mesh network
    Tianhan Gao
    Fangting Peng
    Nan Guo
    EURASIP Journal on Wireless Communications and Networking, 2016
  • [8] A NEW PRIVACY-ENHANCED AUTHENTICATION SCHEME FOR WIRELESS MESH NETWORKS
    Feng, Yong
    Fan, Ming-Yu
    Liu, Chang-Ping
    2008 INTERNATIONAL CONFERENCE ON APPERCEIVING COMPUTING AND INTELLIGENCE ANALYSIS (ICACIA 2008), 2008, : 265 - 269
  • [9] An Instant Authentication Scheme in Wireless Mesh Networks
    Wei, Qian
    He, Jingsha
    Zhang, Xing
    ICCIT: 2009 FOURTH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2009, : 1025 - +
  • [10] Access authentication scheme based on authorized certificate in wireless mesh networks
    Luan, Liangyu
    Fu, Yingfang
    Xiao, Peng
    Journal of Networks, 2014, 9 (01) : 231 - 237