Fast Authentication and Secure Handover for Wireless Mesh Network
Keywords:
Wireless Mesh networks, authentication, handover, ticketAbstract
Wireless Mesh Networks (WMNs) have become the preferred choice for service providers due to their cost-effectiveness and ability to provide extensive network coverage. However, ensuring secure and seamless handoffs in such networks poses a significant challenge due to client mobility and the inherently open nature of the medium. Additionally, the resource constraints of client devices necessitate lightweight computation and communication during both handoff authentication and login authentication phases, which are the focal points of this study. To address these challenges, this work proposes a authentication scheme tailored for WMNs. The scheme revolves around the use of dynamically generated tickets and encrypted session data to facilitate secure communication within the network. These tickets ensure that only authorized nodes can initiate connections, the proposed scheme is the integration of cryptographic techniques, including symmetric and asymmetric encryption. These techniques bolster the security of the authentication process, providing resilience against various security threats . By leveraging these cryptographic mechanisms, the scheme ensures the authenticity of network entities. The proposed authentication scheme addresses the challenges of secure handoffs and lightweight authentication in WMNs. Through the use of dynamically generated tickets and cryptographic techniques, it provides a secure and efficient solution for authentication. Our proposal is effective in terms of the overhead associated with authentication, according to the performance and security analyses.
Downloads
References
I.F. Akyildiz, X. Wang and W. Wang “Wireless mesh networks: a survey" Computer networks,Vol.47,No.4,pp.445-487, March, 2005.
Assegie, T. Admassu, and Pr. Sekharan Nair. "The performance of Gauss Markov’s mobility model in emulated software defined wireless mesh network." Indonesian Journal of Electrical Engineering and Computer Science, Vol. 18, No. 1, pp. 428-433, April 2020.
L. Davoli and G.Ferrari. “Wireless Mesh Networks for IoT and Smart Cities: Technologies and Applications”. The Institution of Engineering and Technology, pp. 1-289,2022.
T. Gao, F. Peng and N Guo "Anonymous authentication scheme based on identity-based proxy group signature for wireless mesh network." EURASIP journal on wireless communications and networking,Vol.2016,No.193,pp.1-10,August,2016.
X. Jiang, M. Liu1, C. Yang , Y. Liu and R. Wang “A Blockchain-Based Authentication Protocol for WLAN Mesh Security Access" Computers, Materials & Continua, Vol.58, no.1, pp.45-59, 2019.
J. Jun and M.L .Sichitiu ”The nominal capacity of wireless mesh networks” IEEE wireless communications, Vol.10,No.5,pp.8-14, Oct,2003.
S. Karunaratne and H. Gacanin, "An Overview of Machine Learning Approaches in Wireless Mesh Networks" IEEE Communications Magazine, Vol. 57, no. 4, pp. 102-108, April 2019, doi: 10.1109/MCOM.2019.1800434.
L. Krishnamurthy, S. Conner, M. Yarvis and J. Chhabra "Meeting the Demands of the Digital Home with High-Speed Multi-Hop Wireless Networks" Intel Technology Journal, Vol. 6, No. 4, November,2002.
Y.M. Lai, P.J. Cheng, C.C. Lee and C.Y. Ku "A new ticket-based authentication mechanism for fast handover in mesh network" PloS one Vol.11,No.5,May, 2016.
C. Li, U.T. Nguyen, H.L. Nguyen and N Huda “Efficient authentication for fast handover in wireless mesh networks" computers & security Vol.37,pp.124-142,September,2013.
F. Liu and Y. Bai "An overview of topology control mechanisms in multi-radio multi-channel wireless mesh networks" EURASIP Journal on Wireless Communications and Networking, Vol 2012, No.324,pp.1-12,October,2012.
R.Poor "Wireless Mesh Networks: Providing industrial-strength connectivity, this technology delivers self-configuring, scalable, and self-healing networks. And it's aimed right at distributed data acquisition and control" SENSORS-PETERBOROUGH, Vol.20,No.2,pp.38-42,2003.
R.Poor ”Wireless mesh links everyday devices” Electronic Engineering Times, No.5, 2004.
G.Rathee and H. Saini "Authentication Through Elliptic Curve Cryptography (ECC) Technique in WMN" International Journal of Information Security and Privacy (IJISP),Vol.12, No.1,pp. 42-52,January-March, 2018.
G.Rathee and H. Saini “Secure handoff technique with reduced authentication delay in wireless mesh network” International Journal of Advanced Intelligence Paradigms, Vol.13,No.1-2,pp.130-150, May,2019.
K.G. Reddy, M.S. Sudheer, P.K. Sree and VP Raju “Simulation analysis on network layer attacks in wireless mesh networks” International Journal of Engineering & Technology, Vol.7(3.29):pp.301–303, 2018.
M. Rekik, A. Meddeb-Makhlouf, F. Zarai and P. Nicopolitidis ” Oap-wmn: Optimised and secure authentication protocol for wireless mesh networks” International Journal of Security and Networks, Vol.14,No.4,pp.205–220, October,2019.
A.K. Roy and A.K. Khan “Authentication protocol with privacy preservation for handover in wireless mesh networks." In First International Conference on Sustainable Technologies for Computational Intelligence: Proceedings of ICTSCI 2019, pp. 383-395. Springer Singapore, 2020.
A.K. Roy, K. Nath, G. Srivastava, T.R. Gadekallu and J.C.W. Lin “Privacy preserving multi-party key exchange protocol for wireless mesh networks” Sensors. 2022 March 2;22(5):1958 https://doi.org/10.3390/s22051958.
algorithm based on matching game and differentiated service in wireless mesh networks” Neural Computing and Applications, Vol.32, pp.2945-2962,2020.
P.K. Sharma, R. Mahajan and Surender “Id-based signcryption authentication algorithm for intra-and interdomain handoff in wireless mesh networks” Iranian Journal of Science and Technology, Transactions of Electrical Engineering, Vol. 44, pp. 659–667, June,2020.
T.T. Vo, N.T. Luong and D. Hoang “MLAMAN: a novel multi-level authentication model and protocol for preventing wormhole attack in mobile ad hoc network” Wireless Networks Vol.25 No. pp.4115-4132, May,2019.
D. Wang, L. Xu, F. Wang and Q Xu “An anonymous batch handover authentication protocol for big flow wireless mesh networks” EURASIP Journal on Wireless Communications and Networking, Vol.2018,No.200,pp.1-8,December,2018.
L. Xu, Y. He, X. Chen and X. Huang “Ticket-based handoff authentication for wireless mesh networks” Computer networks Vol.73, pp.185-194, November, 2014.
H. Yang, H. Luo, F. Ye, S. Lu and L. Zhang, "Security in mobile ad hoc networks: challenges and solutions," in IEEE Wireless Communications, Vol.11, no.1, pp.38-47, February, 2004.
X. Yang, Y. Zhang, J. K. Liu and Y. Zeng, "A Trust and Privacy Preserving Handover Authentication Protocol for Wireless Networks," 2016 IEEE Trustcom/BigDataSE/ISPA, Tianjin,China,2016,pp.138-143,doi: 0.1109/TrustCom.2016.0056.
Z. Yu, X. Xu and X. Wu, "Application of Wireless Mesh Network in campus network," 2010 Second International Conference on Communication Systems, Networks and Applications, Hong Kong, 2010, pp.245-247, doi: 10.1109/ICCSNA.2010.5588704.
Y. Zhou, X. Long, L. Chen and Z. Yang “Conditional privacy-preserving authentication and key agreement scheme for roaming services in VANETs." Journal of Information Security and Applications, Vol. 47, pp. 295-301,August. 2019.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.