A Protocol for Re-authentication and Handoff Notification in Wireless Mesh Networks

نویسندگان

  • Ikbel Daly
  • Faouzi Zarai
چکیده

Mesh technology has captured the interest of university research and industry, because of its capacity to meet at the same time the requirements of Internet service provider and users. But, its architecture and configuration do not ensure a protection against the unauthorized use of the network since the used basic security measures do not include the concept of mobility. Our endeavor in this paper is to introduce a re-authentication scheme for secure handoff based on an efficient mobility management. First, we have treated the mobility aspect. Indeed, we applied the Mobility Notification Message procedure to support an environment which manages handoff in effective way. Then, using this technique, we have defined a new scheme to provide security during handoff. Our study shows that the proposed protocol can provide more protected network and more effective re-authentication scheme in term of minimized handoff latency as well as reduced blocking and loss rates.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Proxy Signature Based Re-authentication Scheme for Secure Fast Handoff in Wireless Mesh Networks

In wireless mesh networks (WMNs), re-authentication guarantees the secure association between a roaming mesh host (MH) and a target mesh access point (MAP) in handoff process. However, due to the complex security mechanisms in re-authentication procedure, handoff delay is significantly extended, making it harder to guarantee the quality of service (QoS) of some mesh applications. In this paper,...

متن کامل

A TESLA-based mutual authentication protocol for GSM networks

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

متن کامل

Re-authentication Protocol for Fast Handoff with Mobile Stations and Routers in Wireless Mesh Networks

Wireless Mesh Network (WMN) is one of the promising technologies in the world of wireless. Indeed, it makes it possible to provide a free mobility and a self-configuration of the various network equipments, an extensible coverage area by the addition of routers, as well as a better quality of services. Despite all of these assets, Mesh technology still suffers from some problems such as securit...

متن کامل

An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks

The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...

متن کامل

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011