A New Wireless Mesh Network Authentication Scheme Based on Threshold Method

被引:0
|
作者
Yang, Yatao [1 ]
Gu, Yonghao
Tan, Xi
Ma, Lina [1 ]
机构
[1] Beijing Elect Sci & Technol Inst, Beijing 100070, Peoples R China
关键词
Wireless mesh network; authentication; threshold method; network security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Access authentication is one of the secure issues which are eager to be resolved in wireless mesh networking. This paper proposes new wireless mesh network authentication architecture based on threshold signature technology. First, we point out the weakness of single authentication server and the security risks of traditional AAA authentication method. Then we design a new authentication system with multiple authentication servers: N authentication servers (AS) compose a authentication server group, only if t or more than t authentication servers allow a certain mobile subscriber require to access to the network, this subscriber can join in the network. This approach solves the deficiencies of single authentication server and guarantees the whole security of the authentication systems in mesh network.
引用
收藏
页码:2260 / 2265
页数:6
相关论文
共 50 条
  • [31] An ID-based Authentication Scheme For the IEEE 802.11s Mesh Network
    Boudguiga, Aymen
    Laurent, Maryline
    2010 IEEE 6TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2010, : 256 - 263
  • [32] An Efficient Authentication and Key Agreement Scheme Based on ECDH for Wireless Sensor Network
    Moghadam, Mostafa Farhadi
    Nikooghadam, Mahdi
    Al Jabban, Maytham Azhar Baqer
    Alishahi, Mohammad
    Mortazavi, Leili
    Mohajerzadeh, Amirhossein
    IEEE ACCESS, 2020, 8 : 73182 - 73192
  • [33] A new authentication scheme with anonymity for wireless environments
    Zhu, JM
    Ma, JF
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (01) : 231 - 235
  • [34] A hash-chain based authentication scheme for fast handover in wireless network
    Hong, K
    Jung, S
    Wu, SF
    INFORMATION SECURITY APPLICATIONS, 2006, 3786 : 96 - 107
  • [35] A Traceable and Anonymous Authentication Scheme Based on Elliptic Curve for Wireless Sensor Network
    Chang F.
    Cui J.
    Wang L.
    Cui, Jie (cuijie@mail.ustc.edu.cn), 2011, Science Press (54): : 2011 - 2020
  • [36] Provable security authentication scheme based on public key for heterogeneous wireless network
    Hou, Hui-Fang
    Liu, Guang-Qiang
    Ji, Xin-Sheng
    Zhang, Qiu-Wen
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2009, 31 (10): : 2385 - 2391
  • [37] Low-complexity authentication scheme based on cellular automata in wireless network
    Jeon, JC
    Kim, KW
    Yoo, KY
    MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2005, 3794 : 413 - 421
  • [38] SMAC-AS: MAC Based Secure Authentication Scheme for Wireless Sensor Network
    Deepti Singh
    Bijendra Kumar
    Samayveer Singh
    Satish Chand
    Wireless Personal Communications, 2019, 107 : 1289 - 1308
  • [39] SMAC-AS: MAC Based Secure Authentication Scheme for Wireless Sensor Network
    Singh, Deepti
    Kumar, Bijendra
    Singh, Samayveer
    Chand, Satish
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 107 (02) : 1289 - 1308
  • [40] Formal Verification of Secure Authentication in Wireless Mesh Network (SAWMN)
    Singh, Ninni
    Saini, Hemraj
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION TECHNOLOGIES, IC3T 2015, VOL 3, 2016, 381 : 375 - 388