Skip to main content
Top
Published in: Wireless Networks 5/2010

01-07-2010

How to secure multi-domain wireless mesh networks

Authors: Xiaoyan Zhu, Yuguang Fang, Yumin Wang

Published in: Wireless Networks | Issue 5/2010

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Due to the ease of deployment and low cost, wireless mesh networks have been deployed in many metropolitan areas and business units. How to establish secure communications among the communication entities such as mesh routers and mobile clients (or mesh clients) even when roaming to different mesh networks (called mesh domains) is a challenging task. In this paper, we leverage the ID-based cryptography and propose a novel secure architecture to enable secure communications in large-scale multi-domain wireless mesh networks. Under this architecture, mesh clients can conveniently gain services securely even when roaming.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
It is computationally infeasible to extract the integer \(x\in {\mathbb{Z}}_{q}^{\ast}=\{i|1\leq i\leq q-1\}\), given \(P,Q\in {\mathbb{G}}_1\) (respectively, \(P,Q\in {\mathbb{G}}_2\)) such that QxP (respectively, Q = P x ).
 
Literature
2.
go back to reference Akyildiz, I., Wang, X., & Wang, W. (2005). Wireless mesh networks: A survey. Computer Networks, 47, 445–487.MATHCrossRef Akyildiz, I., Wang, X., & Wang, W. (2005). Wireless mesh networks: A survey. Computer Networks, 47, 445–487.MATHCrossRef
4.
go back to reference Aguayo, D., Bicket, J., Biswas, S., Judd, G., & Morris, R. (2004). Link-level measurements from an 802.11b mesh network. In ACM SIGCOMM’04, Portland, OR, Aug. 2004. Aguayo, D., Bicket, J., Biswas, S., Judd, G., & Morris, R. (2004). Link-level measurements from an 802.11b mesh network. In ACM SIGCOMM’04, Portland, OR, Aug. 2004.
5.
go back to reference Chandra, R., Qiu, L., Jain, K., & Mahdian, M. (2004). Optimizing the placement of Internet taps in wireless neighborhood networks. In IEEE ICNP’04, Berlin, Germany, Oct. 2004. Chandra, R., Qiu, L., Jain, K., & Mahdian, M. (2004). Optimizing the placement of Internet taps in wireless neighborhood networks. In IEEE ICNP’04, Berlin, Germany, Oct. 2004.
6.
go back to reference Draves, R., Padhye, J., & Zill, B. (2004). Routing in multi-radio, multi-hop wireless mesh networks. In ACM MOBICOM’04, Philadelphia, PA, Sep./Oct. 2004. Draves, R., Padhye, J., & Zill, B. (2004). Routing in multi-radio, multi-hop wireless mesh networks. In ACM MOBICOM’04, Philadelphia, PA, Sep./Oct. 2004.
7.
go back to reference Zhang, Y., & Fang, Y. (2006). ARSA: An attack-resilient security architecture for multi-hop wireless mesh networks. IEEE Journal on Selected Areas in Communications, 24(10), 1916–1928CrossRefMathSciNet Zhang, Y., & Fang, Y. (2006). ARSA: An attack-resilient security architecture for multi-hop wireless mesh networks. IEEE Journal on Selected Areas in Communications, 24(10), 1916–1928CrossRefMathSciNet
8.
go back to reference European Telecommunications Standards Institute (ETSI). (1993). GSM 2.09: Security aspects, June 1993. European Telecommunications Standards Institute (ETSI). (1993). GSM 2.09: Security aspects, June 1993.
9.
go back to reference Lin, H., & Harn, L. (1995). Authentication protocols for personal communication systems. In ACM SIGCOMM’95, Cambridge, MA, Aug./Sept. 1995. Lin, H., & Harn, L. (1995). Authentication protocols for personal communication systems. In ACM SIGCOMM’95, Cambridge, MA, Aug./Sept. 1995.
10.
go back to reference 3GPP TS 21.102, 3rd Generation Partnership Project (3GPP); Technical Specification Group (TSG) SA; 3G Security; Security Architecture, version 4.2.0, Release 4, 2001. 3GPP TS 21.102, 3rd Generation Partnership Project (3GPP); Technical Specification Group (TSG) SA; 3G Security; Security Architecture, version 4.2.0, Release 4, 2001.
11.
go back to reference Lin, Y., & Chen, Y. (2003). Reducing authentication signalling traffic in third-generation mobile network. IEEE Transactions on Wireless Communications, 2(3), 493–501.CrossRef Lin, Y., & Chen, Y. (2003). Reducing authentication signalling traffic in third-generation mobile network. IEEE Transactions on Wireless Communications, 2(3), 493–501.CrossRef
12.
go back to reference Perkins C. (2002). IP mobility support for IPv4, RFC 3344, Aug. 2002. Perkins C. (2002). IP mobility support for IPv4, RFC 3344, Aug. 2002.
13.
go back to reference Zhang, Y., & Fang, Y. (2007). A secure authentication and billing architecture for wireless mesh networks. ACM Wireless Networks 13(5), 569–582.CrossRef Zhang, Y., & Fang, Y. (2007). A secure authentication and billing architecture for wireless mesh networks. ACM Wireless Networks 13(5), 569–582.CrossRef
14.
go back to reference Zhu, H., Lin, X., Lu, R., Ho, P.-H., & Shen, X. (2008). Slab: Secure localized authentication and billing scheme for wireless mesh networks. IEEE Transactions on Wireless Communications, 7(10), 3858–3868.CrossRef Zhu, H., Lin, X., Lu, R., Ho, P.-H., & Shen, X. (2008). Slab: Secure localized authentication and billing scheme for wireless mesh networks. IEEE Transactions on Wireless Communications, 7(10), 3858–3868.CrossRef
15.
go back to reference Ren, K., & Lou, W. (2008). A sophisticated privacy-enhanced yet accountable security framework for wireless mesh networks. In Proceedings of IEEE ICDCS, Beijing, China, June 2008. Ren, K., & Lou, W. (2008). A sophisticated privacy-enhanced yet accountable security framework for wireless mesh networks. In Proceedings of IEEE ICDCS, Beijing, China, June 2008.
16.
go back to reference Shamir, A. (1984). Identity based cryptosystems and signature schemes. In Proceedings of CRYPTO’84. Series LNCS (Vol. 196, pp. 47–53). Berlin/Heidelberg: Springer-Verlag. Shamir, A. (1984). Identity based cryptosystems and signature schemes. In Proceedings of CRYPTO’84. Series LNCS (Vol. 196, pp. 47–53). Berlin/Heidelberg: Springer-Verlag.
17.
go back to reference Boneh, D., & Franklin, M. (2001). Identify-based encryption from the weil pairing. In Proceedings of CRYPTO’01. Series LNCS (Vol. 2139, pp. 213–229). Berlin/Heidelberg: Springer-Verlag. Boneh, D., & Franklin, M. (2001). Identify-based encryption from the weil pairing. In Proceedings of CRYPTO’01. Series LNCS (Vol. 2139, pp. 213–229). Berlin/Heidelberg: Springer-Verlag.
18.
go back to reference Barreto, P., Kim, H., Bynn, B., & Scott, M. (2002). Efficient algorithms for pairing-based cryptosystems. In Proceedings of CRYPTO’02. Series LNCS (Vol. 2442, pp. 354–368). Berlin/Heidelberg: Springer-Verlag. Barreto, P., Kim, H., Bynn, B., & Scott, M. (2002). Efficient algorithms for pairing-based cryptosystems. In Proceedings of CRYPTO’02. Series LNCS (Vol. 2442, pp. 354–368). Berlin/Heidelberg: Springer-Verlag.
19.
go back to reference Mao, W. (2004). An identity-based non-interactive authentication framework for computational grids. Hewlett-Packard Laboratories, Technical Report HPL-2004-96, June 2004. Mao, W. (2004). An identity-based non-interactive authentication framework for computational grids. Hewlett-Packard Laboratories, Technical Report HPL-2004-96, June 2004.
20.
go back to reference Kerins, T., Marnane, W., Popovici, E., & Barreto, P. (2005). Efficient hardware for the tate pairing calculation in characteristic three. In Proceedings of workshop on Cryptographic Hardware and Embedded Systems (CHES’05), Edinburgh, Scotland, Aug./Sep. 2005. Kerins, T., Marnane, W., Popovici, E., & Barreto, P. (2005). Efficient hardware for the tate pairing calculation in characteristic three. In Proceedings of workshop on Cryptographic Hardware and Embedded Systems (CHES’05), Edinburgh, Scotland, Aug./Sep. 2005.
21.
go back to reference Kerins, T., Marnane, W., Popovici, E., & Barreto, P. (2005). A hardware accelerator for pairing based cryptosystems. In IEE proceedings of information security, Vol.152, No. 1, pp. 47–56. Kerins, T., Marnane, W., Popovici, E., & Barreto, P. (2005). A hardware accelerator for pairing based cryptosystems. In IEE proceedings of information security, Vol.152, No. 1, pp. 47–56.
22.
go back to reference Barreto, P., Lynn, B., & Scott, M. (2004). On the selection of pairing-friendly groups. In Selected Areas in Cryptography—SAC’2003. Series LNCS (Vol. 3006, pp. 17–25). Berlin/Heidelberg: Springer-Verlag. Barreto, P., Lynn, B., & Scott, M. (2004). On the selection of pairing-friendly groups. In Selected Areas in Cryptography—SAC’2003. Series LNCS (Vol. 3006, pp. 17–25). Berlin/Heidelberg: Springer-Verlag.
23.
go back to reference Szczechowiak, P., Kargl, A., Scott, M., & Collier, M. (2009). On the application of pairing based cryptography to wireless sensor networks. In ACM Wireless Network Security (WiSec), Zurich, Switzerland, March 2009. Szczechowiak, P., Kargl, A., Scott, M., & Collier, M. (2009). On the application of pairing based cryptography to wireless sensor networks. In ACM Wireless Network Security (WiSec), Zurich, Switzerland, March 2009.
24.
go back to reference Dutta, R., Barua, R., & Sarkar, P. (2004). Pairing-based cryptography: A survey. Cryptology ePrint Archive Report 2004/064. Dutta, R., Barua, R., & Sarkar, P. (2004). Pairing-based cryptography: A survey. Cryptology ePrint Archive Report 2004/064.
25.
go back to reference Sakai, R., Ohgishi, K., & Kasahara, M. (2000). Cryptosystems based on pairing. In Proceedings of 2000 Symposium on Cryptography and Information Security (SCIS2000), Okinawa, Japan, Jan. 2000. Sakai, R., Ohgishi, K., & Kasahara, M. (2000). Cryptosystems based on pairing. In Proceedings of 2000 Symposium on Cryptography and Information Security (SCIS2000), Okinawa, Japan, Jan. 2000.
Metadata
Title
How to secure multi-domain wireless mesh networks
Authors
Xiaoyan Zhu
Yuguang Fang
Yumin Wang
Publication date
01-07-2010
Publisher
Springer US
Published in
Wireless Networks / Issue 5/2010
Print ISSN: 1022-0038
Electronic ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-009-0198-6

Other articles of this Issue 5/2010

Wireless Networks 5/2010 Go to the issue