Browse > Article

A Novel Authentication Protocol based on the Password scheme for Wireless Mesh Network  

Lee, Kyu-Hwan (Ajou University)
Lee, Ju-A (Ajou University)
Kim, Jae-Hyun (Ajou University)
Publication Information
Abstract
We propose a novel authentication protocol for wireless mesh network. The proposed authentication protocol is based on the password scheme for convenience of users. The proposed protocol is evaluated through three analyses. The correctness of the proposed protocol is proved using the GNY analysis. By the security analysis, we show that the proposed protocol is resistant to various attacks. For the performance analysis, we implemented the protocol in Linux operating system based laptop and measured the transmission time. The analytic results show that the proposed protocol provides the secure wireless mesh network without considerable performance degradation.
Keywords
authentication protocol; wireless mesh network; password;
Citations & Related Records
연도 인용수 순위
  • Reference
1 '홈 네트워크 내에서의 멀티 홉통신을 지원하는 인증 프로토콜' JCCI 2007, 평창, 2007년 5윌
2 S. Carter and A. Yasinsac, 'Secure Position Aided Ad hoc Routing Protocol',in Proc. the International Conference on Communications and Computer Networks (CCN) pp. 329-334, Mass, U.S.A., Nov. 4-7, 2002
3 L. Gong, R. Needham, and R. Yahalom, 'Reasoning about Belief in Cryptographic Protocols', in Proc. IEEE Symposium on Research in Security and Privacy, pp. 234-248, Oakland, CA, May 1990   DOI
4 P. Papadimitratos and Z. J. Haas, 'Secure Routing for Mobile Ad hoc Networks', in Proc. the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), pp. 193-204, San Antonio, TX, Jan. 27-31, 2002
5 M. M. Islam, R. Pose, and C. Kopp, 'Suburban Ad-hoc Networks in Information Warfare', in Proc. 6th Australian InfoWar Conference, Geelong, Australia, Nov. 24-25, 2005
6 K. Sanzgiri, D. Laflamme, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, 'Authenticated Routing for Ad Hoc Networks', IEEE Journal on Selected Areas in Communications, Vol. 23, no. 3, Mar. 2005, pp. 598-610   DOI   ScienceOn
7 H. Deng, A. Mukherjee, and D. P. Agrawal, 'Threshold and Identity-based Key Management and. Authentication for Wireless Ad Hoc Networks', in Proc. the Information Technology:Coding and Computing (ITCC'04), vol. 1, pp. 107-111, Las Vegas, U.S.A., Apr. 5-7, 2004   DOI
8 M. Bechler, H.-J. Hof, D. Kraft, F. Phlke, and L. Wolf, 'A Cluster-Based Security Architecture for Ad Hoc Networks', in Proc. INFOCOM 2004, vol. 4, pp. 2393-2403, Hong Kong, Mar. 12-13, 2004
9 A. A. Pirzada and C. McDonald, 'Kerberos Assisted Authentication in Mobile Ad-hoc Networks', in Proc. the 27th Australasian Computer Science Conference (ACSC'04), pp. 41-46, Dunedin, New Zealand, Jan. 18-22, 2004
10 http://www.itu.int/ITU-T/studygroups/com17/index.asp