A Protocol for Re-authentication and Handoff Notification in Wireless Mesh Networks
نویسندگان
چکیده
Mesh technology has captured the interest of university research and industry, because of its capacity to meet at the same time the requirements of Internet service provider and users. But, its architecture and configuration do not ensure a protection against the unauthorized use of the network since the used basic security measures do not include the concept of mobility. Our endeavor in this paper is to introduce a re-authentication scheme for secure handoff based on an efficient mobility management. First, we have treated the mobility aspect. Indeed, we applied the Mobility Notification Message procedure to support an environment which manages handoff in effective way. Then, using this technique, we have defined a new scheme to provide security during handoff. Our study shows that the proposed protocol can provide more protected network and more effective re-authentication scheme in term of minimized handoff latency as well as reduced blocking and loss rates.
منابع مشابه
A Proxy Signature Based Re-authentication Scheme for Secure Fast Handoff in Wireless Mesh Networks
In wireless mesh networks (WMNs), re-authentication guarantees the secure association between a roaming mesh host (MH) and a target mesh access point (MAP) in handoff process. However, due to the complex security mechanisms in re-authentication procedure, handoff delay is significantly extended, making it harder to guarantee the quality of service (QoS) of some mesh applications. In this paper,...
متن کاملA TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملRe-authentication Protocol for Fast Handoff with Mobile Stations and Routers in Wireless Mesh Networks
Wireless Mesh Network (WMN) is one of the promising technologies in the world of wireless. Indeed, it makes it possible to provide a free mobility and a self-configuration of the various network equipments, an extensible coverage area by the addition of routers, as well as a better quality of services. Despite all of these assets, Mesh technology still suffers from some problems such as securit...
متن کاملAn efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks
The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...
متن کاملSecurity Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011