A New Wireless Mesh Network Authentication Scheme Based on Threshold Method

被引:0
|
作者
Yang, Yatao [1 ]
Gu, Yonghao
Tan, Xi
Ma, Lina [1 ]
机构
[1] Beijing Elect Sci & Technol Inst, Beijing 100070, Peoples R China
关键词
Wireless mesh network; authentication; threshold method; network security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Access authentication is one of the secure issues which are eager to be resolved in wireless mesh networking. This paper proposes new wireless mesh network authentication architecture based on threshold signature technology. First, we point out the weakness of single authentication server and the security risks of traditional AAA authentication method. Then we design a new authentication system with multiple authentication servers: N authentication servers (AS) compose a authentication server group, only if t or more than t authentication servers allow a certain mobile subscriber require to access to the network, this subscriber can join in the network. This approach solves the deficiencies of single authentication server and guarantees the whole security of the authentication systems in mesh network.
引用
收藏
页码:2260 / 2265
页数:6
相关论文
共 50 条
  • [21] An Identity-based Access Authentication Scheme for Heterogeneous Wireless Network
    Hou Huifang
    Wang Yuhua
    Wang Yunxia
    Liu Guangqiang
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 231 - 234
  • [22] Anonymity handover authentication protocol based on group signature for wireless Mesh network
    Su B.-T.
    Xu L.
    Wang F.
    Lin Z.-X.
    2016, Editorial Board of Journal on Communications (37): : 174 - 179
  • [23] A New Wireless Mesh Network Based on Network Coding Technology
    Li Wenfeng
    Bai Hui
    2018 INTERNATIONAL CONFERENCE ON SENSOR NETWORKS AND SIGNAL PROCESSING (SNSP 2018), 2018, : 35 - 39
  • [24] A Variable Threshold-Value Authentication Architecture for Wireless Mesh Networks
    Guo, Ping
    Wang, Jin
    Geng, Xue Hua
    Kim, Chang Seob
    Kim, Jeong-Uk
    JOURNAL OF INTERNET TECHNOLOGY, 2014, 15 (06): : 929 - 935
  • [25] Popularity-Based Content Replication Scheme for Wireless Mesh Network
    Yang, Chenkai
    Huang, Liusheng
    Wang, Xinglong
    Xu, Hongli
    Leng, Bing
    2015 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS & SIGNAL PROCESSING (WCSP), 2015,
  • [26] A Threshold Cryptography Based Authentication Scheme for Mobile Ad-hoc Network
    Dey, Haimabati
    Datta, Raja
    ADVANCES IN NETWORKS AND COMMUNICATIONS, PT II, 2011, 132 : 400 - 409
  • [27] Delay-Based RREQ Routing Scheme for Wireless Mesh Network
    Chang, Ching-Lung
    Lin, Tung-Li
    JOURNAL OF INTERNET TECHNOLOGY, 2009, 10 (02): : 103 - 109
  • [28] LEAS: Localized efficient authentication scheme for multi-operator wireless mesh network with identity-based proxy signature
    Gao, Tianhan
    Guo, Nan
    Yim, Kangbin
    MATHEMATICAL AND COMPUTER MODELLING, 2013, 58 (5-6) : 1427 - 1440
  • [29] The Authentication Method In Wireless Sensor Network Based On Trust Model
    Voitovych, Olesia
    Kupershtein, Leonid
    Shulyatitska, Olga
    Malyushytskyy, Viktor
    2017 IEEE FIRST UKRAINE CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (UKRCON), 2017, : 993 - 997
  • [30] SLAB: A Secure Localized Authentication and Billing Scheme for Wireless Mesh Networks
    Zhu, Haojin
    Lin, Xiaodong
    Lu, Rongxing
    Ho, Pin-Han
    Shen, Xuemin
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (10) : 3858 - 3868