Fast Authentication and Secure Handover for Wireless Mesh Network

Authors

  • Vanlalhruaia, Ajoy Kumar Khan, Amit Kumar Roy

Keywords:

Wireless Mesh networks, authentication, handover, ticket

Abstract

Wireless Mesh Networks (WMNs) have become the preferred choice for service providers due to their cost-effectiveness and ability to provide extensive network coverage. However, ensuring secure and seamless handoffs in such networks poses a significant challenge due to client mobility and the inherently open nature of the medium. Additionally, the resource constraints of client devices necessitate lightweight computation and communication during both handoff authentication and login authentication phases, which are the focal points of this study. To address these challenges, this work proposes a authentication scheme tailored for WMNs. The scheme revolves around the use of dynamically generated tickets and encrypted session data to facilitate secure communication within the network. These tickets ensure that only authorized nodes can initiate connections, the proposed scheme is the integration of cryptographic techniques, including symmetric and asymmetric encryption. These techniques bolster the security of the authentication process, providing resilience against various security threats . By leveraging these cryptographic mechanisms, the scheme ensures the authenticity of network entities. The proposed authentication scheme addresses the challenges of secure handoffs and lightweight authentication in WMNs. Through the use of dynamically generated tickets and cryptographic techniques, it provides a secure and efficient solution for authentication. Our proposal is effective in terms of the overhead associated with authentication, according to the performance and security analyses.

Downloads

Download data is not yet available.

References

I.F. Akyildiz, X. Wang and W. Wang “Wireless mesh networks: a survey" Computer networks,Vol.47,No.4,pp.445-487, March, 2005.

Assegie, T. Admassu, and Pr. Sekharan Nair. "The performance of Gauss Markov’s mobility model in emulated software defined wireless mesh network." Indonesian Journal of Electrical Engineering and Computer Science, Vol. 18, No. 1, pp. 428-433, April 2020.

L. Davoli and G.Ferrari. “Wireless Mesh Networks for IoT and Smart Cities: Technologies and Applications”. The Institution of Engineering and Technology, pp. 1-289,2022.

T. Gao, F. Peng and N Guo "Anonymous authentication scheme based on identity-based proxy group signature for wireless mesh network." EURASIP journal on wireless communications and networking,Vol.2016,No.193,pp.1-10,August,2016.

X. Jiang, M. Liu1, C. Yang , Y. Liu and R. Wang “A Blockchain-Based Authentication Protocol for WLAN Mesh Security Access" Computers, Materials & Continua, Vol.58, no.1, pp.45-59, 2019.

J. Jun and M.L .Sichitiu ”The nominal capacity of wireless mesh networks” IEEE wireless communications, Vol.10,No.5,pp.8-14, Oct,2003.

S. Karunaratne and H. Gacanin, "An Overview of Machine Learning Approaches in Wireless Mesh Networks" IEEE Communications Magazine, Vol. 57, no. 4, pp. 102-108, April 2019, doi: 10.1109/MCOM.2019.1800434.

L. Krishnamurthy, S. Conner, M. Yarvis and J. Chhabra "Meeting the Demands of the Digital Home with High-Speed Multi-Hop Wireless Networks" Intel Technology Journal, Vol. 6, No. 4, November,2002.

Y.M. Lai, P.J. Cheng, C.C. Lee and C.Y. Ku "A new ticket-based authentication mechanism for fast handover in mesh network" PloS one Vol.11,No.5,May, 2016.

C. Li, U.T. Nguyen, H.L. Nguyen and N Huda “Efficient authentication for fast handover in wireless mesh networks" computers & security Vol.37,pp.124-142,September,2013.

F. Liu and Y. Bai "An overview of topology control mechanisms in multi-radio multi-channel wireless mesh networks" EURASIP Journal on Wireless Communications and Networking, Vol 2012, No.324,pp.1-12,October,2012.

R.Poor "Wireless Mesh Networks: Providing industrial-strength connectivity, this technology delivers self-configuring, scalable, and self-healing networks. And it's aimed right at distributed data acquisition and control" SENSORS-PETERBOROUGH, Vol.20,No.2,pp.38-42,2003.

R.Poor ”Wireless mesh links everyday devices” Electronic Engineering Times, No.5, 2004.

G.Rathee and H. Saini "Authentication Through Elliptic Curve Cryptography (ECC) Technique in WMN" International Journal of Information Security and Privacy (IJISP),Vol.12, No.1,pp. 42-52,January-March, 2018.

G.Rathee and H. Saini “Secure handoff technique with reduced authentication delay in wireless mesh network” International Journal of Advanced Intelligence Paradigms, Vol.13,No.1-2,pp.130-150, May,2019.

K.G. Reddy, M.S. Sudheer, P.K. Sree and VP Raju “Simulation analysis on network layer attacks in wireless mesh networks” International Journal of Engineering & Technology, Vol.7(3.29):pp.301–303, 2018.

M. Rekik, A. Meddeb-Makhlouf, F. Zarai and P. Nicopolitidis ” Oap-wmn: Optimised and secure authentication protocol for wireless mesh networks” International Journal of Security and Networks, Vol.14,No.4,pp.205–220, October,2019.

A.K. Roy and A.K. Khan “Authentication protocol with privacy preservation for handover in wireless mesh networks." In First International Conference on Sustainable Technologies for Computational Intelligence: Proceedings of ICTSCI 2019, pp. 383-395. Springer Singapore, 2020.

A.K. Roy, K. Nath, G. Srivastava, T.R. Gadekallu and J.C.W. Lin “Privacy preserving multi-party key exchange protocol for wireless mesh networks” Sensors. 2022 March 2;22(5):1958 https://doi.org/10.3390/s22051958.

algorithm based on matching game and differentiated service in wireless mesh networks” Neural Computing and Applications, Vol.32, pp.2945-2962,2020.

P.K. Sharma, R. Mahajan and Surender “Id-based signcryption authentication algorithm for intra-and interdomain handoff in wireless mesh networks” Iranian Journal of Science and Technology, Transactions of Electrical Engineering, Vol. 44, pp. 659–667, June,2020.

T.T. Vo, N.T. Luong and D. Hoang “MLAMAN: a novel multi-level authentication model and protocol for preventing wormhole attack in mobile ad hoc network” Wireless Networks Vol.25 No. pp.4115-4132, May,2019.

D. Wang, L. Xu, F. Wang and Q Xu “An anonymous batch handover authentication protocol for big flow wireless mesh networks” EURASIP Journal on Wireless Communications and Networking, Vol.2018,No.200,pp.1-8,December,2018.

L. Xu, Y. He, X. Chen and X. Huang “Ticket-based handoff authentication for wireless mesh networks” Computer networks Vol.73, pp.185-194, November, 2014.

H. Yang, H. Luo, F. Ye, S. Lu and L. Zhang, "Security in mobile ad hoc networks: challenges and solutions," in IEEE Wireless Communications, Vol.11, no.1, pp.38-47, February, 2004.

X. Yang, Y. Zhang, J. K. Liu and Y. Zeng, "A Trust and Privacy Preserving Handover Authentication Protocol for Wireless Networks," 2016 IEEE Trustcom/BigDataSE/ISPA, Tianjin,China,2016,pp.138-143,doi: 0.1109/TrustCom.2016.0056.

Z. Yu, X. Xu and X. Wu, "Application of Wireless Mesh Network in campus network," 2010 Second International Conference on Communication Systems, Networks and Applications, Hong Kong, 2010, pp.245-247, doi: 10.1109/ICCSNA.2010.5588704.

Y. Zhou, X. Long, L. Chen and Z. Yang “Conditional privacy-preserving authentication and key agreement scheme for roaming services in VANETs." Journal of Information Security and Applications, Vol. 47, pp. 295-301,August. 2019.

Downloads

Published

16.03.2024

How to Cite

Ajoy Kumar Khan, Amit Kumar Roy, V. . (2024). Fast Authentication and Secure Handover for Wireless Mesh Network. International Journal of Intelligent Systems and Applications in Engineering, 12(3), 1057–1065. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5385

Issue

Section

Research Article