A PKI Based Mesh Router Authentication Scheme to Protect from Malicious Node in Wireless Mesh Network

نویسندگان

  • Kwang Hyun Lee
  • Choong Seon Hong
چکیده

Wireless mesh network can increase service coverage by low-cost multiple-paths between a source and a destination. But because of the wireless nature, wireless mesh network is vulnerable to diversified threats. Especially attacks by malicious nodes can decrease the performance or ravage the network. Many protocols, based on Public Key Infrastructure (PKI), have been proposed to ensure security however; these protocols cannot efficiently prevent the cases of compromised nodes. In this paper, we propose a mesh router authentication scheme to solve this problem of existing protocols. Although our scheme increases the end-to-end delay, the proposed mesh router authentication scheme can guarantee secure wireless mesh network communication from malicious nodes.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Performance Evaluation of Different CRL Distribution Schemes Embedded in WMN Authentication

Wireless Mesh Networks (WMNs) have emerged as a promising technology to provide low cost and scalable solutions for high speed Internet access and additional services. In hybrid WMNs, where mesh clients also act as relaying agents and form a mesh client network, it is important to provide users with an efficient anonymous and accountable authentication scheme. Accountability is required for the...

متن کامل

Anonymous authentication scheme based on identity-based proxy group signature for wireless mesh network

Access security is the key obstacle of the rapid popularization of wireless mesh network (WMN). We suggest the proxy group signature scheme based on identity in this paper. This scheme is combined with proxy group signature and identity-based group signature, based on designated hierarchical proxy architecture for WMN. An anonymous mutual authentication scheme is thus achieved, which not only s...

متن کامل

Detection of Selfish and Malicious Node in Wireless Mesh Network Using Pana Protocol

Wireless Mesh Network is one of emerging technology of the next generation networks. All the routing protocols in WMNs assume all nodes to be co-operative in forwarding each other’s packets. However, a node might try to save its energy by dropping others packet. The proposed mesh network is divided into clusters which reduce the traffic congestion to the gateway. Each cluster has cluster head w...

متن کامل

A Bilateral Authentication Protocol Based on Lightweight CA and Proof with BAN Logic for Wireless Mesh Networks

In a Wireless Mesh Network (WMN), we cannot assume the existence of a trusted certificate authority that is used in regular Public-Key Infrastructure (PKI). Hence a cooperative approach in which a cluster of some nodes can issue certificates to other nodes in a self-organizing manner is considered to be more suitable to the Ad-hoc nature of WMNs. In this paper, we propose a new trust establishm...

متن کامل

Distributed Authentication and Key Management in Wireless Mesh Networks

Authentication and Key Management (AKM) in Wireless Networks have been addressed in the IEEE 802.11i standard [10]. However, the IEEE 802.11s [21] Wireless Mesh Networks impose some further AKM requirements due to their large scale, distributed functionalities and decentralized authority. According to the IEEE 802.11s specifications, any security solutions should rely on IEEE 802.11i mechanisms...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009