Browse > Article

Data Origin Authentication Scheme for Wireless Mesh Networks  

Kang, Nam-Hi (Digita1 Media Department, Duksung Women's University)
Publication Information
Abstract
Wireless mesh network, which is an access network technology, adopts ubiquitous features of ad-hoc network that includes capabilities of self-configuration and self-management. This paper proposes a scheme which enables nodes along route in wireless mesh network to authenticate data and verify data integrity. The scheme distinguishes infra-node, which is a network device used to form mesh network, and user node in ad-hoc network, which operates functions as a sender, receiver or relayer, to deploy different authentication scheme. That is, hop-based authentication scheme along route forming wireless backbone differs from authentication scheme for user nodes in route over MANET. The proposed scheme is less complex than previously proposed schemes from the repects of security setup procedures and managements. In addition, the scheme is able to reduce transmission delay from a source to a destination owing to fast authentication over wireless backbone.
Keywords
Data Origin Authentication; Wireless Mesh Networks; MANET Security; One-way Hash;
Citations & Related Records
연도 인용수 순위
  • Reference
1 P. Zimmermann, A. Johnston, J. Callas, "ZRTP: Media Path Key Agreement for Secure RTP," IETF Intenet-Draft, January 2010.
2 J. Arkko, E. Carrara, F. Lindholm, M. Naslund, K. Norrman, "MIKEY: Multimedia Internet KEYing," IETF RFC 3830, August 2004.
3 D. Coppersmith and M. Jakobsson, "Almost optimal hash sequence traversal," in Proc. of the Fourth Conf. on Financial Cryptography, Lecture Notes in Computer Science, vol. 2357, pp. 102-119, 2003.
4 IETF MANET (Mobile Ad hoc Networks) Working Group, MANET Charter's page in http://www.ietf.org/html.charters
5 R. Bruno, M. Conti, and E. Gregori, "Mesh Networks: Commodity Multihop Ad Hoc Networks," IEEE Com. Mag., pp. 123-131, Mar. 2005.
6 Y. Hu, A. Perrig, "A Survey of Secure Wireless Ad Hoc Routing," IEEE Security & Privacy vol.2(3), pp. 28-39, May/June 2004.
7 R. Akbani, T. Korkmaz, G. Raju, "HEAP: A Packet Authentication Scheme for Mobile Ad hoc Networks," Ad Hoc Networks vol. 6(9), pp. 1134-1150, September 2008.   DOI
8 S. Zhu, S. Xu, S. Setia, Z. Jajodia, "LHAP: a lightweight network access control protocol for ad-hoc networks," Ad Hoc Networks Journal vol.4(5), pp. 567-585, May 2006.   DOI   ScienceOn
9 B. Lu, U.W. Pooch, "A lightweight authentication protocol for mobile ad hoc networks," International Journal of Information Technology, vol11(2), pp. 119-135, February 2005.
10 A. Perrig, R. Canetti, J. Tygar, D. Song, "Efficient and Secure Source Authentication for Multicast," in Proc. of the Network and Distributed System Security Symposium (NDSS), pp. 35-46, February 2001.
11 N. Kang, S. Yoo, Y. Kim, S. Jung, K. Hong, "Heterogeneous Routing Protocol Coordinator for Mobile Ad Hoc Networks," in Proc. of UCS 2006, LNCS 4239, pp. 384-397, October 2006.
12 T. Wu, "The SRP Authentication and Key Exchange System," IETF RFC 2945, September 2000.