Skip to main content
Log in

Enhanced security using proxy signcryption technique for wireless mesh networks

  • ORIGINAL ARTICLE
  • Published:
International Journal of System Assurance Engineering and Management Aims and scope Submit manuscript

Abstract

Authentication delay is the main requirement for handoff in wireless mesh networks when mobile client moves from one domain to another. In order to solve the problems, we propose an algorithm for handoff in Wireless Mesh Networks. Pre-authentication is done by the mobile station itself up to the next access point. A neighbor graph is used for maintaining and dynamically identifying the mobile topology of the network. A proxy signcryption scheme is applied between the Mesh Node (MN) and mobile client (MC) for the period of inter-domain authentication. To make sure security, the authentication messages are encrypted while transmitted between mobile client and mesh nodes and signed in an integrated fashion such that the communicated message is expressed as signcrypted. The simulation’s output shows, that the algorithm strengthens the security of the network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  • Akilarasu G, Shalinie SM (2014) Trust based authentication and key establishment for secure routing in WMN. KSII transactions on internet and information systems 8(12)

  • Akilarasu G, Shalinie SM (2017) Wormhole-free routing and DoS attack defense in wireless mesh networks. Wireless Netw 23(6):1709–1718. https://doi.org/10.1007/s11276-016-1240-0

    Article  Google Scholar 

  • Alamri N, Chow CE, Aljaedi A, Elgzil A (2018) UFAP: ultra-fast handoff authentication protocol for wireless mesh networks. In: 2018 Wireless Days (WD) p 1–8 https://doi.org/10.1109/WD.2018.8361684

  • Ansaroudi ZE, Pashazadeh S (2019) Modeling and formal verification of the ticket-based handoff authentication protocol for wireless mesh networks. In: international symposium on pervasive systems, algorithms and networks, Springer, Cham https://doi.org/10.1007/978-3-030-30143-9_12

  • Gao T, Peng F, Guo N (2016) Anonymous authentication scheme based on identity-based proxy group signature for wireless mesh network. EURASIP J Wirel Commun Netw 2016(1):1–10. https://doi.org/10.1186/s13638-016-0685-2

    Article  Google Scholar 

  • Ghosh S, Bhadra S, Bhattacharya I (2011) Group-key management model for worldwide wireless mesh networks. Int J Commun Netw Secur 1(2):7–14

    Article  Google Scholar 

  • IEEE 802 Committee (2003) Draft Amendment to standard for telecommunications and information exchange between systems-LAN/MAN specific requirements-part 11: wireless medium access control (MAC) and physical layer (PHY) specifications: medium access control (MAC) security enhancements. IEEE Std 802.11 i/D7. 0

  • IEEE 802.1 Working Group (2001) Standards for local and metropolitan area networks: standrad for port based network access control. IEEE Draft P802. 1X/D11

  • Lai YM, Cheng PJ, Lee CC, Ku CY (2016) A new ticket-based authentication mechanism for fast handover in mesh network. PLoS ONE 11(5):e0155064. https://doi.org/10.1371/journal.pone.0155064

    Article  Google Scholar 

  • Mahajan R, Sharma PK (2016) Authentication based secure protocol using TTP for Wmn's. In: 2016 3rd International conference on computing for sustainable global development (INDIACom) p 3286–3290

  • Malik S, Singh RK (2019) A novel block chain-based approach for secure handoff in WMN with reduced authentication delay. Int J Emerg Technol 10(2):299–306

    Google Scholar 

  • Quang VT, Le Viet H (2019) Key management techniques for wireless mesh network. In: Wireless mesh networks-security, architectures and protocols. intechopen

  • Rathee G, Saini H (2016) A fast handoff technique in wireless mesh network (FHT for WMN). Proced Comput Sci 79:722–728. https://doi.org/10.1016/j.procs.2016.03.095

    Article  Google Scholar 

  • Rathee G, Saini H (2019) Secure handoff technique with reduced authentication delay in wireless mesh network. Int J Adv Intell Paradig 13(1–2):130–154. https://doi.org/10.1504/IJAIP.2019.099948

    Article  Google Scholar 

  • Sen J (2011) An anonymous authentication and communication protocol for wireless mesh networks. In: International conference on advances in computing and communications. Springer, Berlin, Heidelberg https://doi.org/10.1007/978-3-642-22726-4_60.

  • Sharma PK, Mahajan R (2017) A Security architecture for attacks detection and authentication in wireless mesh networks. Clust Comput 20(3):2323–2332. https://doi.org/10.1007/s10586-017-0970-9

    Article  Google Scholar 

  • Sharma PK, Mahajan R, Surender (2020) ID-based signcryption authentication algorithm for intra- and inter-domain handoff in wireless mesh networks. Iran J Sci Technol Trans Electr Eng 44:659–667. https://doi.org/10.1007/s40998-019-00258-8

    Article  Google Scholar 

  • Sharma PK, Mahajan R, Surender (2021) Trust-based multi-level secure routing for authentication and authorisation in WMN. Int J Adv Intell Paradig 20(3–4):323–342. https://doi.org/10.1504/IJAIP.2021.119021

    Article  Google Scholar 

  • Wang D, Xu L, Wang F, Xu Q (2018) An anonymous batch handover authentication protocol for big flow wireless mesh networks. EURASIP J Wirel Commun Netw 2018(1):1–8. https://doi.org/10.1186/s13638-018-1217-z

    Article  Google Scholar 

  • Xiao P, He J, Fu Y (2012) Distributed group key management in wireless mesh networks. Int J Secur Appl 6(2):115–120

    Google Scholar 

  • Xu L, He Y, Chen X, Huang X (2014) Ticket-based handoff authentication for wireless mesh networks. Comput Netw 73:185–194. https://doi.org/10.1016/j.comnet.2014.08.009

    Article  Google Scholar 

  • Yang X, Huang X, Han J, Su C (2016) proved handover authentication and key pre-distribution for wireless mesh networks. Concurrency Computation Pract Exper 28(10):2978–2990. https://doi.org/10.1002/cpe.3544

    Article  Google Scholar 

  • Yang X, Huang X, Han J, Su C (2016a) Improved handover authentication and key pre-distribution for wireless mesh networks. Concurrency Comput Pract Exper 28(10):2978–2990. https://doi.org/10.1002/cpe.3544

    Article  Google Scholar 

  • Yang X, Zhang Y, Liu JK, Zeng Y (2016b) A trust and privacy preserving handover authentication protocol for wireless networks. In: 2016b IEEE Trustcom/BigDataSE/ISPA p 138–143 https://doi.org/10.1002/cpe.3544

  • Yi D, Xu G, Minqing Z (2011) The research on certificateless hierarchical key management in wireless mesh network. In: 2011 IEEE 3rd international conference on communication software and networks p 504–507 https://doi.org/10.1109/ICCSN.2011.6013643

  • Yin H, Ni H, Sun L, Wang M, Zhou X (2013) A caching-list based fast handoff mechanism in wireless mesh networks. In: 2013 International conference on ICT convergence (ICTC) p 402–407 https://doi.org/10.1109/ICTC.2013.6675382

  • Zhang X, Li G, Han W, Ji H (2015a) A novel ID-based multi-domain handover protocol for mesh points in WMNs. KSII Transactions on Internet and Information Systems (TIIS) 9(7):2512–2529. https://doi.org/10.3837/tiis.2015.07.10

    Article  Google Scholar 

  • Zhang X, Li G, Han W (2015b) Ticket-based authentication for fast handover in wireless mesh networks. Wireless Pers Commun 85(3):1509–1523. https://doi.org/10.1007/s11277-015-2853-9

    Article  Google Scholar 

  • Zhu H, Lin X, Lu R, Ho PH, Shen X (2008) SLAB: a secure localized authentication and billing scheme for wireless mesh networks. IEEE Trans Wireless Commun 7(10):3858–3868. https://doi.org/10.1109/T-WC.2008.07418

    Article  Google Scholar 

Download references

Funding

The authors did not receive support from any organization for the submitted work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Purushottam Sharma.

Ethics declarations

Conflict of interest

The authors declare that they have no conflicts of interest to report regarding the present study.

Human and animal rights statement

This is an observational study. This research includes No involvement of Humans and Animals, so no ethical approval is required.

Informed consent

The studies are conducted on already available data for which consent is not required.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Singla, S., Sharma, P. & Sharma, P.K. Enhanced security using proxy signcryption technique for wireless mesh networks. Int J Syst Assur Eng Manag 14, 474–482 (2023). https://doi.org/10.1007/s13198-022-01820-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13198-022-01820-0

Keywords

Navigation