A New Wireless Mesh Network Authentication Scheme Based on Threshold Method

被引:0
|
作者
Yang, Yatao [1 ]
Gu, Yonghao
Tan, Xi
Ma, Lina [1 ]
机构
[1] Beijing Elect Sci & Technol Inst, Beijing 100070, Peoples R China
关键词
Wireless mesh network; authentication; threshold method; network security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Access authentication is one of the secure issues which are eager to be resolved in wireless mesh networking. This paper proposes new wireless mesh network authentication architecture based on threshold signature technology. First, we point out the weakness of single authentication server and the security risks of traditional AAA authentication method. Then we design a new authentication system with multiple authentication servers: N authentication servers (AS) compose a authentication server group, only if t or more than t authentication servers allow a certain mobile subscriber require to access to the network, this subscriber can join in the network. This approach solves the deficiencies of single authentication server and guarantees the whole security of the authentication systems in mesh network.
引用
收藏
页码:2260 / 2265
页数:6
相关论文
共 50 条
  • [41] An Authentication Scheme for Wireless Healthcare Monitoring Sensor Network
    El Zouka, Hesham A.
    2017 14TH INTERNATIONAL CONFERENCE ON SMART CITIES: IMPROVING QUALITY OF LIFE USING ICT & IOT (HONET-ICT), 2017, : 68 - 73
  • [42] A study on the autonomous network synchronization scheme for mesh wireless network
    Tabata, K
    Kishi, Y
    Konishi, S
    Nomoto, S
    PIMRC 2003: 14TH IEEE 2003 INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS PROCEEDINGS, VOLS 1-3 2003, 2003, : 829 - 833
  • [43] Threshold Key Redistribution for Dynamic Change of Authentication Group in Wireless Mesh Networks
    Yang, Kan
    Jia, Xiaohua
    Zhang, Bo
    Zheng, Zhongming
    2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
  • [44] BILINEAR PAIRINGS-BASED THRESHOLD IDENTITY AUTHENTICATION SCHEME FOR AD HOC NETWORK
    Xu, Feng
    Zhu, Yuqi
    Ma, Hongxu
    Cai, Bin
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2012, 18 (05): : 601 - 609
  • [45] A secure routing scheme based on social network analysis in wireless mesh networks
    Yao YU
    Zhaolong NING
    Lei GUO
    ScienceChina(InformationSciences), 2016, 59 (12) : 143 - 154
  • [46] 802.11s based fast transition scheme for wireless mesh network
    Fang X.
    Sun S.
    He R.
    Xinan Jiaotong Daxue Xuebao/Journal of Southwest Jiaotong University, 2010, 45 (05): : 725 - 731
  • [47] Mean field network based QoS routing scheme in wireless mesh networks
    Liu, LG
    Feng, GZ
    2005 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING PROCEEDINGS, VOLS 1 AND 2, 2005, : 1064 - 1067
  • [48] A Secure Authentication Scheme in Adhoc Network Using Threshold Cryptography
    Priya, Lalita
    Chatterjee, Kakali
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATIONS TECHNOLOGIES (ICCCT 15), 2015, : 152 - 155
  • [49] Implementation of Forward Pointer-Based Routing Scheme for Wireless Mesh Network
    Abhishek Majumder
    Sudipta Roy
    Arabian Journal for Science and Engineering, 2016, 41 : 1109 - 1127
  • [50] Implementation of Forward Pointer-Based Routing Scheme for Wireless Mesh Network
    Majumder, Abhishek
    Roy, Sudipta
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2016, 41 (03) : 1109 - 1127