Skip to main content
Top

2016 | OriginalPaper | Chapter

Formal Verification of Secure Authentication in Wireless Mesh Network (SAWMN)

Authors : Ninni Singh, Hemraj Saini

Published in: Proceedings of the Second International Conference on Computer and Communication Technologies

Publisher: Springer India

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Wireless mesh network (WMN) is considered to be an evolving technique because of self-configuration and adaptive features, and it supports large-scale network especially in an organization and academics. As with any network, communication among nodes plays an important role, when two nodes in a network communicate with each other via the internet, secure authentication is an imperative challenge. In literature, there are many approaches that have been suggested to deliver a secure authentication between nodes in WMN; however, all these outlines contain some disadvantages, i.e., management cost of the public key and system complexity. In this paper, a Secure Authentication in Wireless Mesh Network (SAWMN) approach is proposed which overcomes these drawbacks and provides an efficient authentication to the mesh clients. Further, SAWMN results have been shown simulated on AVISPA SPAN to ascertain the authenticity of the proposed approach.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Akyildiz, I.F., Wang, X., Wang, W.: A survey on wireless mesh networks. IEEE Radio Commun. 47(4), 445–487 (2005) Akyildiz, I.F., Wang, X., Wang, W.: A survey on wireless mesh networks. IEEE Radio Commun. 47(4), 445–487 (2005)
2.
go back to reference Zhou, L., Zygmunt, Hass, J.: Securing adhoc networks. IEEE Networks 24–30 (1999) Zhou, L., Zygmunt, Hass, J.: Securing adhoc networks. IEEE Networks 24–30 (1999)
3.
go back to reference Egners, A., Meyer, U.: Wireless mesh network security: state of affairs. IEEE 35th on Conference on Local Computer Networks, 997–1004 (2010) Egners, A., Meyer, U.: Wireless mesh network security: state of affairs. IEEE 35th on Conference on Local Computer Networks, 997–1004 (2010)
4.
go back to reference Wu, T., Xue, Y., Cui, Y.: Preserving traffic privacy in wireless mesh networks. Proceedings of the International Symposium on a World of Wireless, Mobile and Multi-media Networks (WoWMoM‘06), pp. 459–461 (2006) Wu, T., Xue, Y., Cui, Y.: Preserving traffic privacy in wireless mesh networks. Proceedings of the International Symposium on a World of Wireless, Mobile and Multi-media Networks (WoWMoM‘06), pp. 459–461 (2006)
5.
go back to reference Sen, J., Chowdhury, P.R., Sengupta, I.: A distributed trust mechanism for mobile ad hoc networks. Proceedings of the international symposium on ad hoc and ubiq-uitous computing (ISAHUC’06), pp. 20–23 (2006) Sen, J., Chowdhury, P.R., Sengupta, I.: A distributed trust mechanism for mobile ad hoc networks. Proceedings of the international symposium on ad hoc and ubiq-uitous computing (ISAHUC’06), pp. 20–23 (2006)
6.
go back to reference Sen, J.: A robust and efficient node authentication protocol for mobile ad hoc net-works. Proceedings of the 2nd IEEE International Conference on Computational In-telligence, Modelling and Simulation (CIMSiM 2010), pp. 476–481 (2010) Sen, J.: A robust and efficient node authentication protocol for mobile ad hoc net-works. Proceedings of the 2nd IEEE International Conference on Computational In-telligence, Modelling and Simulation (CIMSiM 2010), pp. 476–481 (2010)
7.
go back to reference IEEE P802.11 s/D2.06:part 11: Wireless LAN MAC and physical layer significance. Amendment 10: Mesh Networking. IEEE Working Draft Proposed standard, Rev.2.06, (2009) IEEE P802.11 s/D2.06:part 11: Wireless LAN MAC and physical layer significance. Amendment 10: Mesh Networking. IEEE Working Draft Proposed standard, Rev.2.06, (2009)
8.
go back to reference Mishra, A., Arbaugh, W.A.: An initial security analysis of the IEEE 802.1X stand-ard. Computer Science Department Technical Report CS-TR-4328, University of Mary-land, USA, pp. 1–12 (2002) Mishra, A., Arbaugh, W.A.: An initial security analysis of the IEEE 802.1X stand-ard. Computer Science Department Technical Report CS-TR-4328, University of Mary-land, USA, pp. 1–12 (2002)
9.
go back to reference Kassab, M., Belghith, A., Bonnin, J.M. Sassi, S.: Fast Pre-Authentication Based on Proactive Key Distribution for 802.11 Infrastructure Networks. Proceedings of the 1st ACM Workshop on Wireless Multimedia Networking and performance modeling, pp. 46–53 (2005) Kassab, M., Belghith, A., Bonnin, J.M. Sassi, S.: Fast Pre-Authentication Based on Proactive Key Distribution for 802.11 Infrastructure Networks. Proceedings of the 1st ACM Workshop on Wireless Multimedia Networking and performance modeling, pp. 46–53 (2005)
10.
go back to reference Prasad, A.R., Wang, H.: Roaming key based fast handover in WLANs. Proceed-ings of IEEE Wireless Communications and Networking Conference (WCNC 2003), 2005, pp. 1570–1576, vol. 3, (2005) Prasad, A.R., Wang, H.: Roaming key based fast handover in WLANs. Proceed-ings of IEEE Wireless Communications and Networking Conference (WCNC 2003), 2005, pp. 1570–1576, vol. 3, (2005)
11.
go back to reference Salem, N.B., Hubaux, J.P.: Securing wireless mesh networks. IEEE Wireless Commun. 13(2), 50–55 (2006) Salem, N.B., Hubaux, J.P.: Securing wireless mesh networks. IEEE Wireless Commun. 13(2), 50–55 (2006)
12.
go back to reference Cheikhrouhou, O., Laurent-Maknavicius, M., Chaouchi, H.: Security architecture in a multi-hop mesh network. 5th Conference on Safety and Architectures Networks, SAR 2006, Seignosse, Landes, France, pp. 1–10 (2006) Cheikhrouhou, O., Laurent-Maknavicius, M., Chaouchi, H.: Security architecture in a multi-hop mesh network. 5th Conference on Safety and Architectures Networks, SAR 2006, Seignosse, Landes, France, pp. 1–10 (2006)
13.
go back to reference Parthasarathy, M.: Protocol for carrying authentication and network access (PANA): threat analysis and security requirements RFC 4016,” The Internet Society, pp. 1–15 (2005) Parthasarathy, M.: Protocol for carrying authentication and network access (PANA): threat analysis and security requirements RFC 4016,” The Internet Society, pp. 1–15 (2005)
14.
go back to reference Zhu, S., Xu, S., Setia, S., Jajodia, S.: LHAP: A lightweight hop-by-hop authentica-tion protocol for ad-hoc networks. Proceedings of the 23rd IEEE International Confer-ence on Distributed Computing Systems Workshops (ICDCSW’03), pp. 749–755 (2003) Zhu, S., Xu, S., Setia, S., Jajodia, S.: LHAP: A lightweight hop-by-hop authentica-tion protocol for ad-hoc networks. Proceedings of the 23rd IEEE International Confer-ence on Distributed Computing Systems Workshops (ICDCSW’03), pp. 749–755 (2003)
15.
go back to reference Zhu, S., Xu, S., Setia, S., Jajodia, S.: LHAP: a lightweight network access control protocol for ad hoc networks. Ad Hoc Networks 4(5), 567–585 (2006) Zhu, S., Xu, S., Setia, S., Jajodia, S.: LHAP: a lightweight network access control protocol for ad hoc networks. Ad Hoc Networks 4(5), 567–585 (2006)
16.
go back to reference Moustafa, H.: Providing authentication, trust, and privacy in wireless mesh networks. In: Zhang, Y., et al. (eds.) Security in Wireless Mesh Networks, pp. 261–295. CRC Press, USA (2007) Moustafa, H.: Providing authentication, trust, and privacy in wireless mesh networks. In: Zhang, Y., et al. (eds.) Security in Wireless Mesh Networks, pp. 261–295. CRC Press, USA (2007)
17.
go back to reference Zhu, H., Lin, X., Lu, R., Ho, H. P., Shen, X.: A secure localized authentication and billing scheme for wireless mesh networks. IEEE Trans. Wireless Commun. 7(10), 3858–3868 (2008) Zhu, H., Lin, X., Lu, R., Ho, H. P., Shen, X.: A secure localized authentication and billing scheme for wireless mesh networks. IEEE Trans. Wireless Commun. 7(10), 3858–3868 (2008)
18.
go back to reference He, B., Joshi, S., Agrawal, D. P., Sun, D.: An efficient authenticated key establish-ment scheme for wireless mesh networks. Proceedings of IEEE Global Telecommuni-cations Conference (GLOBECOM’10), pp. 1–5 (2010) He, B., Joshi, S., Agrawal, D. P., Sun, D.: An efficient authenticated key establish-ment scheme for wireless mesh networks. Proceedings of IEEE Global Telecommuni-cations Conference (GLOBECOM’10), pp. 1–5 (2010)
19.
go back to reference Sun, J., Zhang, C., Zhang, Y., Fang, Y.: SAT: a security architecture achieving anonymity and traceability in wireless mesh networks. IEEE Trans. Depend-able Secure Comput. 8(2), 295–307 (2011) Sun, J., Zhang, C., Zhang, Y., Fang, Y.: SAT: a security architecture achieving anonymity and traceability in wireless mesh networks. IEEE Trans. Depend-able Secure Comput. 8(2), 295–307 (2011)
20.
go back to reference Gao, T., Guo, N., Yim, K.: Delegation-based mutual authentication scheme for multi operator wireless mesh networks. Proceedings of (IMIS2012), pp. 143–147 (2012) Gao, T., Guo, N., Yim, K.: Delegation-based mutual authentication scheme for multi operator wireless mesh networks. Proceedings of (IMIS2012), pp. 143–147 (2012)
21.
go back to reference Boneh, D., Franklin, M.: Identity based encryption from the Weil Pairing. SIAM J. Comput. 32(3), 586–615 (2003) Boneh, D., Franklin, M.: Identity based encryption from the Weil Pairing. SIAM J. Comput. 32(3), 586–615 (2003)
22.
go back to reference Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. Proceed-ings of Advances in Cryptology—AsiaCrypt 2001, Lecture Notes in Computer Science, vol. 2248, pp. 514–532. Springer-Verlag (2001) Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. Proceed-ings of Advances in Cryptology—AsiaCrypt 2001, Lecture Notes in Computer Science, vol. 2248, pp. 514–532. Springer-Verlag (2001)
24.
go back to reference Lamport, L.: The temporal logic of actions. ACM Trans. Programm. Languages Syst. 16(3), 872–923 (1994) Lamport, L.: The temporal logic of actions. ACM Trans. Programm. Languages Syst. 16(3), 872–923 (1994)
25.
go back to reference Lamport, L.: Specifying Systems. Addison-Wesley (2002) Lamport, L.: Specifying Systems. Addison-Wesley (2002)
Metadata
Title
Formal Verification of Secure Authentication in Wireless Mesh Network (SAWMN)
Authors
Ninni Singh
Hemraj Saini
Copyright Year
2016
Publisher
Springer India
DOI
https://doi.org/10.1007/978-81-322-2526-3_39