Browse > Article
http://dx.doi.org/10.5392/JKCA.2011.11.9.017

An Efficient Authentication Method for Secure Access to Wireless Mesh Networks  

Heo, Ung (전북대학교 전자공학부 영상정보신기술연구센터)
He, Yu-Shan (전북대학교 전자공학부 영상정보신기술연구센터)
You, Kang-Soo (전주대학교 교양학부)
Choi, Jae-Ho (전북대학교 전자공학부 영상정보신기술연구센터)
Publication Information
Abstract
The wireless mesh networks are recently getting much attention for commercial applications. In such networks, the service should be uninterrupted when roaming from one domain to another while the authentication for a secure access should be maintained. The challenge is to consider the authentic coordination between the home domain and foreign domains and the maintenance of local authenticity between foreign domains. In this paper, a novel authentication method is presented so that a mobile mesh node can be effectively authenticated and obtain an secure connection in foreign domains. In the proposed method, the authentication process does not rely on an end-to-end connection between the foreign domain and the home domain. Even without a connectivity to the home domain, the foreign domain can provide an effective authentication of a mesh node by consulting one of the neighboring foreign domains that has been visited by the mobile mesh node. In order to verify the performance of our proposed method, a qualitative analysis has been performed and compared to those of conventional methods. The results show that our method is superior to the conventional ones in terms of authentication response time and authentication service robustness.
Keywords
Wireless Mesh Network; Access Security; Authentication; Roaming;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Y. Zhang and Y. Fang, "A Secure Authentication and Billing Architecture for Wireless Mesh Networks," Wireless Networks, Vol.13, No.5, pp.663-678, 2007.   DOI
2 Y. Chen, J. Jan, and C. Chen, "A Fair and Secure Mobile Billing System," Computer Networks, Vol.48, No.4, pp.517-524, 2005.   DOI   ScienceOn
3 D. Zhang, U. Heo, and J. Choi, "Neighborhood based security for wireless sensor networks," Proc. of KISPS, Vol.11, No.1, pp.166-169, 2010.
4 P. Qiu, U. Heo, and J. Choi, "A gateway protocol architecture for Zigbee based sensor network interconnecting TCP/IP networks," Vol.10, No.3, pp.176-180, KISPS, 2009.   과학기술학회마을
5 S. Glass, M. Portmann, and V. Muthukkumarasamy, "Securing Wireless Mesh Network," IEEE Internet Computing, Vol.12, No.4, pp.30-36, 2008.   DOI   ScienceOn
6 European Telecommunications Standards Institute (ETSI), GSM 2.09: Security Aspects, 1993.
7 C. Lee, H. Oh, and S. Kim, "A New Authentication Protocol for IEEE 802.11 using a Group Key Supporting Fast Handover," Proc. of ICCIT 2007, pp.269-272, 2007.   DOI
8 E. Bresson, O. Chevassut, A. Essiari, and D. Pointcheval, "Mutual authentication and group key agreement for low-power mobile devices," Computer Communications, Vol.27, No.17, pp.1730-1734, 2004.   DOI   ScienceOn
9 T. R. Im, Hwaseong Lee, K. T. Cho, and D. H. Lee, "Secure Mutual Authentication and Fair Billing for Roaming Service In Wireless Mobile Networks," Proc. of ICCIT 2008, Vol.2, pp.466-471, 2008.   DOI
10 HY. Lin and L. Harn, "Authentication protocols for personal communication systems," Proc. of SIGCOMM'95, Vol.25, No.4, pp.256-261, 1995.   DOI
11 D. Johnson, C. Perkins, and J. Arkko Mobility support in IPv6, RFC 3775, Jun. 2004.
12 M. Long, C. Wu, and J. D. Irwin, "Localized Authentication for Wireless LAN Internetwork Roaming," Proc. of WCNC 2004, Vol.1, pp.264-267, 2004.   DOI
13 S. R. Tuladhar, C. E. Caicedo, and J. B. D. Joshi, "Inter-Domain Authentication for Seamless Roaming in Heterogeneous Wireless Networks," Proc. of SUTC'08, pp.249-255, 2008(6).   DOI
14 B. Aboba and D. Simon, PPP EAP TLS Authentication Protocol, IETF RFC 2716, Oct. 1999.
15 E. Hossain and Kin K.L Wireless Mesh Networks : architectures and protocols, Springer Verlag, 2008.
16 I. F. Akyildiz, X. Wang, and W. Wang, "Wireless mesh networks: a survey," Computer Networks, Vol.47, No.4, pp.445-487, 2005.   DOI   ScienceOn