Skip to main content

Formal Verification of Secure Authentication in Wireless Mesh Network (SAWMN)

  • Conference paper
  • First Online:
Proceedings of the Second International Conference on Computer and Communication Technologies

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 381))

Abstract

Wireless mesh network (WMN) is considered to be an evolving technique because of self-configuration and adaptive features, and it supports large-scale network especially in an organization and academics. As with any network, communication among nodes plays an important role, when two nodes in a network communicate with each other via the internet, secure authentication is an imperative challenge. In literature, there are many approaches that have been suggested to deliver a secure authentication between nodes in WMN; however, all these outlines contain some disadvantages, i.e., management cost of the public key and system complexity. In this paper, a Secure Authentication in Wireless Mesh Network (SAWMN) approach is proposed which overcomes these drawbacks and provides an efficient authentication to the mesh clients. Further, SAWMN results have been shown simulated on AVISPA SPAN to ascertain the authenticity of the proposed approach.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Akyildiz, I.F., Wang, X., Wang, W.: A survey on wireless mesh networks. IEEE Radio Commun. 47(4), 445–487 (2005)

    Google Scholar 

  2. Zhou, L., Zygmunt, Hass, J.: Securing adhoc networks. IEEE Networks 24–30 (1999)

    Google Scholar 

  3. Egners, A., Meyer, U.: Wireless mesh network security: state of affairs. IEEE 35th on Conference on Local Computer Networks, 997–1004 (2010)

    Google Scholar 

  4. Wu, T., Xue, Y., Cui, Y.: Preserving traffic privacy in wireless mesh networks. Proceedings of the International Symposium on a World of Wireless, Mobile and Multi-media Networks (WoWMoM‘06), pp. 459–461 (2006)

    Google Scholar 

  5. Sen, J., Chowdhury, P.R., Sengupta, I.: A distributed trust mechanism for mobile ad hoc networks. Proceedings of the international symposium on ad hoc and ubiq-uitous computing (ISAHUC’06), pp. 20–23 (2006)

    Google Scholar 

  6. Sen, J.: A robust and efficient node authentication protocol for mobile ad hoc net-works. Proceedings of the 2nd IEEE International Conference on Computational In-telligence, Modelling and Simulation (CIMSiM 2010), pp. 476–481 (2010)

    Google Scholar 

  7. IEEE P802.11 s/D2.06:part 11: Wireless LAN MAC and physical layer significance. Amendment 10: Mesh Networking. IEEE Working Draft Proposed standard, Rev.2.06, (2009)

    Google Scholar 

  8. Mishra, A., Arbaugh, W.A.: An initial security analysis of the IEEE 802.1X stand-ard. Computer Science Department Technical Report CS-TR-4328, University of Mary-land, USA, pp. 1–12 (2002)

    Google Scholar 

  9. Kassab, M., Belghith, A., Bonnin, J.M. Sassi, S.: Fast Pre-Authentication Based on Proactive Key Distribution for 802.11 Infrastructure Networks. Proceedings of the 1st ACM Workshop on Wireless Multimedia Networking and performance modeling, pp. 46–53 (2005)

    Google Scholar 

  10. Prasad, A.R., Wang, H.: Roaming key based fast handover in WLANs. Proceed-ings of IEEE Wireless Communications and Networking Conference (WCNC 2003), 2005, pp. 1570–1576, vol. 3, (2005)

    Google Scholar 

  11. Salem, N.B., Hubaux, J.P.: Securing wireless mesh networks. IEEE Wireless Commun. 13(2), 50–55 (2006)

    Google Scholar 

  12. Cheikhrouhou, O., Laurent-Maknavicius, M., Chaouchi, H.: Security architecture in a multi-hop mesh network. 5th Conference on Safety and Architectures Networks, SAR 2006, Seignosse, Landes, France, pp. 1–10 (2006)

    Google Scholar 

  13. Parthasarathy, M.: Protocol for carrying authentication and network access (PANA): threat analysis and security requirements RFC 4016,” The Internet Society, pp. 1–15 (2005)

    Google Scholar 

  14. Zhu, S., Xu, S., Setia, S., Jajodia, S.: LHAP: A lightweight hop-by-hop authentica-tion protocol for ad-hoc networks. Proceedings of the 23rd IEEE International Confer-ence on Distributed Computing Systems Workshops (ICDCSW’03), pp. 749–755 (2003)

    Google Scholar 

  15. Zhu, S., Xu, S., Setia, S., Jajodia, S.: LHAP: a lightweight network access control protocol for ad hoc networks. Ad Hoc Networks 4(5), 567–585 (2006)

    Google Scholar 

  16. Moustafa, H.: Providing authentication, trust, and privacy in wireless mesh networks. In: Zhang, Y., et al. (eds.) Security in Wireless Mesh Networks, pp. 261–295. CRC Press, USA (2007)

    Google Scholar 

  17. Zhu, H., Lin, X., Lu, R., Ho, H. P., Shen, X.: A secure localized authentication and billing scheme for wireless mesh networks. IEEE Trans. Wireless Commun. 7(10), 3858–3868 (2008)

    Google Scholar 

  18. He, B., Joshi, S., Agrawal, D. P., Sun, D.: An efficient authenticated key establish-ment scheme for wireless mesh networks. Proceedings of IEEE Global Telecommuni-cations Conference (GLOBECOM’10), pp. 1–5 (2010)

    Google Scholar 

  19. Sun, J., Zhang, C., Zhang, Y., Fang, Y.: SAT: a security architecture achieving anonymity and traceability in wireless mesh networks. IEEE Trans. Depend-able Secure Comput. 8(2), 295–307 (2011)

    Google Scholar 

  20. Gao, T., Guo, N., Yim, K.: Delegation-based mutual authentication scheme for multi operator wireless mesh networks. Proceedings of (IMIS2012), pp. 143–147 (2012)

    Google Scholar 

  21. Boneh, D., Franklin, M.: Identity based encryption from the Weil Pairing. SIAM J. Comput. 32(3), 586–615 (2003)

    Google Scholar 

  22. Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. Proceed-ings of Advances in Cryptology—AsiaCrypt 2001, Lecture Notes in Computer Science, vol. 2248, pp. 514–532. Springer-Verlag (2001)

    Google Scholar 

  23. AVISPA Team: HLPSL Tutorial. http://www.avispa-project.org/package/tutorial.pdf. Retrieved 9th Dec 2014

  24. Lamport, L.: The temporal logic of actions. ACM Trans. Programm. Languages Syst. 16(3), 872–923 (1994)

    Google Scholar 

  25. Lamport, L.: Specifying Systems. Addison-Wesley (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ninni Singh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer India

About this paper

Cite this paper

Singh, N., Saini, H. (2016). Formal Verification of Secure Authentication in Wireless Mesh Network (SAWMN). In: Satapathy, S., Raju, K., Mandal, J., Bhateja, V. (eds) Proceedings of the Second International Conference on Computer and Communication Technologies. Advances in Intelligent Systems and Computing, vol 381. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2526-3_39

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2526-3_39

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2525-6

  • Online ISBN: 978-81-322-2526-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics