Abstract
Wireless mesh network (WMN) is considered to be an evolving technique because of self-configuration and adaptive features, and it supports large-scale network especially in an organization and academics. As with any network, communication among nodes plays an important role, when two nodes in a network communicate with each other via the internet, secure authentication is an imperative challenge. In literature, there are many approaches that have been suggested to deliver a secure authentication between nodes in WMN; however, all these outlines contain some disadvantages, i.e., management cost of the public key and system complexity. In this paper, a Secure Authentication in Wireless Mesh Network (SAWMN) approach is proposed which overcomes these drawbacks and provides an efficient authentication to the mesh clients. Further, SAWMN results have been shown simulated on AVISPA SPAN to ascertain the authenticity of the proposed approach.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Akyildiz, I.F., Wang, X., Wang, W.: A survey on wireless mesh networks. IEEE Radio Commun. 47(4), 445–487 (2005)
Zhou, L., Zygmunt, Hass, J.: Securing adhoc networks. IEEE Networks 24–30 (1999)
Egners, A., Meyer, U.: Wireless mesh network security: state of affairs. IEEE 35th on Conference on Local Computer Networks, 997–1004 (2010)
Wu, T., Xue, Y., Cui, Y.: Preserving traffic privacy in wireless mesh networks. Proceedings of the International Symposium on a World of Wireless, Mobile and Multi-media Networks (WoWMoM‘06), pp. 459–461 (2006)
Sen, J., Chowdhury, P.R., Sengupta, I.: A distributed trust mechanism for mobile ad hoc networks. Proceedings of the international symposium on ad hoc and ubiq-uitous computing (ISAHUC’06), pp. 20–23 (2006)
Sen, J.: A robust and efficient node authentication protocol for mobile ad hoc net-works. Proceedings of the 2nd IEEE International Conference on Computational In-telligence, Modelling and Simulation (CIMSiM 2010), pp. 476–481 (2010)
IEEE P802.11 s/D2.06:part 11: Wireless LAN MAC and physical layer significance. Amendment 10: Mesh Networking. IEEE Working Draft Proposed standard, Rev.2.06, (2009)
Mishra, A., Arbaugh, W.A.: An initial security analysis of the IEEE 802.1X stand-ard. Computer Science Department Technical Report CS-TR-4328, University of Mary-land, USA, pp. 1–12 (2002)
Kassab, M., Belghith, A., Bonnin, J.M. Sassi, S.: Fast Pre-Authentication Based on Proactive Key Distribution for 802.11 Infrastructure Networks. Proceedings of the 1st ACM Workshop on Wireless Multimedia Networking and performance modeling, pp. 46–53 (2005)
Prasad, A.R., Wang, H.: Roaming key based fast handover in WLANs. Proceed-ings of IEEE Wireless Communications and Networking Conference (WCNC 2003), 2005, pp. 1570–1576, vol. 3, (2005)
Salem, N.B., Hubaux, J.P.: Securing wireless mesh networks. IEEE Wireless Commun. 13(2), 50–55 (2006)
Cheikhrouhou, O., Laurent-Maknavicius, M., Chaouchi, H.: Security architecture in a multi-hop mesh network. 5th Conference on Safety and Architectures Networks, SAR 2006, Seignosse, Landes, France, pp. 1–10 (2006)
Parthasarathy, M.: Protocol for carrying authentication and network access (PANA): threat analysis and security requirements RFC 4016,” The Internet Society, pp. 1–15 (2005)
Zhu, S., Xu, S., Setia, S., Jajodia, S.: LHAP: A lightweight hop-by-hop authentica-tion protocol for ad-hoc networks. Proceedings of the 23rd IEEE International Confer-ence on Distributed Computing Systems Workshops (ICDCSW’03), pp. 749–755 (2003)
Zhu, S., Xu, S., Setia, S., Jajodia, S.: LHAP: a lightweight network access control protocol for ad hoc networks. Ad Hoc Networks 4(5), 567–585 (2006)
Moustafa, H.: Providing authentication, trust, and privacy in wireless mesh networks. In: Zhang, Y., et al. (eds.) Security in Wireless Mesh Networks, pp. 261–295. CRC Press, USA (2007)
Zhu, H., Lin, X., Lu, R., Ho, H. P., Shen, X.: A secure localized authentication and billing scheme for wireless mesh networks. IEEE Trans. Wireless Commun. 7(10), 3858–3868 (2008)
He, B., Joshi, S., Agrawal, D. P., Sun, D.: An efficient authenticated key establish-ment scheme for wireless mesh networks. Proceedings of IEEE Global Telecommuni-cations Conference (GLOBECOM’10), pp. 1–5 (2010)
Sun, J., Zhang, C., Zhang, Y., Fang, Y.: SAT: a security architecture achieving anonymity and traceability in wireless mesh networks. IEEE Trans. Depend-able Secure Comput. 8(2), 295–307 (2011)
Gao, T., Guo, N., Yim, K.: Delegation-based mutual authentication scheme for multi operator wireless mesh networks. Proceedings of (IMIS2012), pp. 143–147 (2012)
Boneh, D., Franklin, M.: Identity based encryption from the Weil Pairing. SIAM J. Comput. 32(3), 586–615 (2003)
Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. Proceed-ings of Advances in Cryptology—AsiaCrypt 2001, Lecture Notes in Computer Science, vol. 2248, pp. 514–532. Springer-Verlag (2001)
AVISPA Team: HLPSL Tutorial. http://www.avispa-project.org/package/tutorial.pdf. Retrieved 9th Dec 2014
Lamport, L.: The temporal logic of actions. ACM Trans. Programm. Languages Syst. 16(3), 872–923 (1994)
Lamport, L.: Specifying Systems. Addison-Wesley (2002)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer India
About this paper
Cite this paper
Singh, N., Saini, H. (2016). Formal Verification of Secure Authentication in Wireless Mesh Network (SAWMN). In: Satapathy, S., Raju, K., Mandal, J., Bhateja, V. (eds) Proceedings of the Second International Conference on Computer and Communication Technologies. Advances in Intelligent Systems and Computing, vol 381. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2526-3_39
Download citation
DOI: https://doi.org/10.1007/978-81-322-2526-3_39
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2525-6
Online ISBN: 978-81-322-2526-3
eBook Packages: EngineeringEngineering (R0)