Browse > Article
http://dx.doi.org/10.7840/KICS.2012.37B.5.385

Mutual Authentication Method between Wireless Mesh Enabled MSAPs in the Next-generation TICN  

Son, Yu-Jin (아주대학교 컴퓨터 공학과 유비쿼터스 네트워크 시스템 연구실)
Bae, Byoung-Gu (아주대학교 컴퓨터 공학과 유비쿼터스 네트워크 시스템 연구실)
Shon, Tae-Shik (아주대학교 컴퓨터 공학과 유비쿼터스 네트워크 시스템 연구실)
Ko, Young-Bae (아주대학교 컴퓨터 공학과 유비쿼터스 네트워크 시스템 연구실)
Lim, Kwang-Jae (ERTI 한국전자통신연구원 모바일응용통신연구팀)
Yun, Mi-Young (ERTI 한국전자통신연구원 모바일응용통신연구팀)
Abstract
The tactical mobile communication network, which comprises a part of the next-generation Tactical Information and Communication Network (TICN), provides means of communication and control for Tactical Multi-Functional Terminals (TMFT) belonging to a Mobile Subscriber Access Point (MSAP). The next-generation of MSAP is capable of constructing a backbone network via LCTR and HCTR directional antennas. At the same time, WMN modules are used to create and manage a wireless mesh backbone. When directional antennas are used in mobile environments, seamless services cannot be efficiently supported as the movement of the node prevents the angle of the antenna to constantly match. Therefore, data communication through the wireless mesh networks is required to provide direct communication between mobile MSAPs. Accordingly, mutual authentication and data encryption mechanisms are required to provide reliable data transmission in this environment. To provide efficient mutual authentication between MSAP devices, the process of verifying a certificate of the other MSAP device through its own authentication server is required. This paper proposes mutual authentication mechanisms where the MSAP requiring authentication and the MSAP that permits it initiates low-cost and efficient authentication in a distributed way. More specifically, we propose a method of applying EAP-ELS (Extensible Authentication Protocol-Transport Layer Security) in the next-generation TICN.
Keywords
IEEE 802.16m; EAP-TLS; Distributed Authentication;
Citations & Related Records
연도 인용수 순위
  • Reference
1 박귀순, 황정섭, "미래 전장 환경변화에 따른 TICN 체계 요구 기능 및 능력," Telecommunications Review, 제20권 2호, pp.196-206, 2010.
2 유정훈, 조정호, 권오주, 박귀순, "Mobile WiMAX 기반의 전술이동통신체계 테스트베드 성능분석," 한국통신학회지, 제 26권 제3호, pp.9-15, 2009.
3 F. Akyildiz, X. Wang, W. Wang, "Wireless mesh networks: a survey," Computer Networks. vol 47, no.4, pp.445-487, 2005.   DOI   ScienceOn
4 [EAP-TLS] RFC 5216, http://www.ietf.org/rfc/rfc5216.txt
5 IEEE P802.11sTM/D7.0, Amendment 10: Mesh Networking, July. 2010.
6 IEEE P802.11iTM/D10.0, MAC security enhancements, amendment 6 to IEEE Standard for local and metropolitan area networks part 11: Wireless MAC and PHY specifications. April. 2004.
7 [MD5 Algorithm] RFC 1321, http://wwwwww.ietf.org/rfc/rfc1321.txt
8 [TLS] RFC 2246, http://www.ietf.org/rfc/rfc2246.txt
9 D. Johnston and J. Walker, "Overview of IEEE 802.16 Security," IEEE Security & Privacy, magazine May/June 2004.
10 [RADIUS] RFC 2865, http://www.ietf.org/rfc/rfc2865.txt