Skip to main content
Erschienen in: Wireless Networks 5/2010

01.07.2010

How to secure multi-domain wireless mesh networks

verfasst von: Xiaoyan Zhu, Yuguang Fang, Yumin Wang

Erschienen in: Wireless Networks | Ausgabe 5/2010

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Due to the ease of deployment and low cost, wireless mesh networks have been deployed in many metropolitan areas and business units. How to establish secure communications among the communication entities such as mesh routers and mobile clients (or mesh clients) even when roaming to different mesh networks (called mesh domains) is a challenging task. In this paper, we leverage the ID-based cryptography and propose a novel secure architecture to enable secure communications in large-scale multi-domain wireless mesh networks. Under this architecture, mesh clients can conveniently gain services securely even when roaming.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
It is computationally infeasible to extract the integer \(x\in {\mathbb{Z}}_{q}^{\ast}=\{i|1\leq i\leq q-1\}\), given \(P,Q\in {\mathbb{G}}_1\) (respectively, \(P,Q\in {\mathbb{G}}_2\)) such that QxP (respectively, Q = P x ).
 
Literatur
2.
Zurück zum Zitat Akyildiz, I., Wang, X., & Wang, W. (2005). Wireless mesh networks: A survey. Computer Networks, 47, 445–487.MATHCrossRef Akyildiz, I., Wang, X., & Wang, W. (2005). Wireless mesh networks: A survey. Computer Networks, 47, 445–487.MATHCrossRef
4.
Zurück zum Zitat Aguayo, D., Bicket, J., Biswas, S., Judd, G., & Morris, R. (2004). Link-level measurements from an 802.11b mesh network. In ACM SIGCOMM’04, Portland, OR, Aug. 2004. Aguayo, D., Bicket, J., Biswas, S., Judd, G., & Morris, R. (2004). Link-level measurements from an 802.11b mesh network. In ACM SIGCOMM’04, Portland, OR, Aug. 2004.
5.
Zurück zum Zitat Chandra, R., Qiu, L., Jain, K., & Mahdian, M. (2004). Optimizing the placement of Internet taps in wireless neighborhood networks. In IEEE ICNP’04, Berlin, Germany, Oct. 2004. Chandra, R., Qiu, L., Jain, K., & Mahdian, M. (2004). Optimizing the placement of Internet taps in wireless neighborhood networks. In IEEE ICNP’04, Berlin, Germany, Oct. 2004.
6.
Zurück zum Zitat Draves, R., Padhye, J., & Zill, B. (2004). Routing in multi-radio, multi-hop wireless mesh networks. In ACM MOBICOM’04, Philadelphia, PA, Sep./Oct. 2004. Draves, R., Padhye, J., & Zill, B. (2004). Routing in multi-radio, multi-hop wireless mesh networks. In ACM MOBICOM’04, Philadelphia, PA, Sep./Oct. 2004.
7.
Zurück zum Zitat Zhang, Y., & Fang, Y. (2006). ARSA: An attack-resilient security architecture for multi-hop wireless mesh networks. IEEE Journal on Selected Areas in Communications, 24(10), 1916–1928CrossRefMathSciNet Zhang, Y., & Fang, Y. (2006). ARSA: An attack-resilient security architecture for multi-hop wireless mesh networks. IEEE Journal on Selected Areas in Communications, 24(10), 1916–1928CrossRefMathSciNet
8.
Zurück zum Zitat European Telecommunications Standards Institute (ETSI). (1993). GSM 2.09: Security aspects, June 1993. European Telecommunications Standards Institute (ETSI). (1993). GSM 2.09: Security aspects, June 1993.
9.
Zurück zum Zitat Lin, H., & Harn, L. (1995). Authentication protocols for personal communication systems. In ACM SIGCOMM’95, Cambridge, MA, Aug./Sept. 1995. Lin, H., & Harn, L. (1995). Authentication protocols for personal communication systems. In ACM SIGCOMM’95, Cambridge, MA, Aug./Sept. 1995.
10.
Zurück zum Zitat 3GPP TS 21.102, 3rd Generation Partnership Project (3GPP); Technical Specification Group (TSG) SA; 3G Security; Security Architecture, version 4.2.0, Release 4, 2001. 3GPP TS 21.102, 3rd Generation Partnership Project (3GPP); Technical Specification Group (TSG) SA; 3G Security; Security Architecture, version 4.2.0, Release 4, 2001.
11.
Zurück zum Zitat Lin, Y., & Chen, Y. (2003). Reducing authentication signalling traffic in third-generation mobile network. IEEE Transactions on Wireless Communications, 2(3), 493–501.CrossRef Lin, Y., & Chen, Y. (2003). Reducing authentication signalling traffic in third-generation mobile network. IEEE Transactions on Wireless Communications, 2(3), 493–501.CrossRef
12.
Zurück zum Zitat Perkins C. (2002). IP mobility support for IPv4, RFC 3344, Aug. 2002. Perkins C. (2002). IP mobility support for IPv4, RFC 3344, Aug. 2002.
13.
Zurück zum Zitat Zhang, Y., & Fang, Y. (2007). A secure authentication and billing architecture for wireless mesh networks. ACM Wireless Networks 13(5), 569–582.CrossRef Zhang, Y., & Fang, Y. (2007). A secure authentication and billing architecture for wireless mesh networks. ACM Wireless Networks 13(5), 569–582.CrossRef
14.
Zurück zum Zitat Zhu, H., Lin, X., Lu, R., Ho, P.-H., & Shen, X. (2008). Slab: Secure localized authentication and billing scheme for wireless mesh networks. IEEE Transactions on Wireless Communications, 7(10), 3858–3868.CrossRef Zhu, H., Lin, X., Lu, R., Ho, P.-H., & Shen, X. (2008). Slab: Secure localized authentication and billing scheme for wireless mesh networks. IEEE Transactions on Wireless Communications, 7(10), 3858–3868.CrossRef
15.
Zurück zum Zitat Ren, K., & Lou, W. (2008). A sophisticated privacy-enhanced yet accountable security framework for wireless mesh networks. In Proceedings of IEEE ICDCS, Beijing, China, June 2008. Ren, K., & Lou, W. (2008). A sophisticated privacy-enhanced yet accountable security framework for wireless mesh networks. In Proceedings of IEEE ICDCS, Beijing, China, June 2008.
16.
Zurück zum Zitat Shamir, A. (1984). Identity based cryptosystems and signature schemes. In Proceedings of CRYPTO’84. Series LNCS (Vol. 196, pp. 47–53). Berlin/Heidelberg: Springer-Verlag. Shamir, A. (1984). Identity based cryptosystems and signature schemes. In Proceedings of CRYPTO’84. Series LNCS (Vol. 196, pp. 47–53). Berlin/Heidelberg: Springer-Verlag.
17.
Zurück zum Zitat Boneh, D., & Franklin, M. (2001). Identify-based encryption from the weil pairing. In Proceedings of CRYPTO’01. Series LNCS (Vol. 2139, pp. 213–229). Berlin/Heidelberg: Springer-Verlag. Boneh, D., & Franklin, M. (2001). Identify-based encryption from the weil pairing. In Proceedings of CRYPTO’01. Series LNCS (Vol. 2139, pp. 213–229). Berlin/Heidelberg: Springer-Verlag.
18.
Zurück zum Zitat Barreto, P., Kim, H., Bynn, B., & Scott, M. (2002). Efficient algorithms for pairing-based cryptosystems. In Proceedings of CRYPTO’02. Series LNCS (Vol. 2442, pp. 354–368). Berlin/Heidelberg: Springer-Verlag. Barreto, P., Kim, H., Bynn, B., & Scott, M. (2002). Efficient algorithms for pairing-based cryptosystems. In Proceedings of CRYPTO’02. Series LNCS (Vol. 2442, pp. 354–368). Berlin/Heidelberg: Springer-Verlag.
19.
Zurück zum Zitat Mao, W. (2004). An identity-based non-interactive authentication framework for computational grids. Hewlett-Packard Laboratories, Technical Report HPL-2004-96, June 2004. Mao, W. (2004). An identity-based non-interactive authentication framework for computational grids. Hewlett-Packard Laboratories, Technical Report HPL-2004-96, June 2004.
20.
Zurück zum Zitat Kerins, T., Marnane, W., Popovici, E., & Barreto, P. (2005). Efficient hardware for the tate pairing calculation in characteristic three. In Proceedings of workshop on Cryptographic Hardware and Embedded Systems (CHES’05), Edinburgh, Scotland, Aug./Sep. 2005. Kerins, T., Marnane, W., Popovici, E., & Barreto, P. (2005). Efficient hardware for the tate pairing calculation in characteristic three. In Proceedings of workshop on Cryptographic Hardware and Embedded Systems (CHES’05), Edinburgh, Scotland, Aug./Sep. 2005.
21.
Zurück zum Zitat Kerins, T., Marnane, W., Popovici, E., & Barreto, P. (2005). A hardware accelerator for pairing based cryptosystems. In IEE proceedings of information security, Vol.152, No. 1, pp. 47–56. Kerins, T., Marnane, W., Popovici, E., & Barreto, P. (2005). A hardware accelerator for pairing based cryptosystems. In IEE proceedings of information security, Vol.152, No. 1, pp. 47–56.
22.
Zurück zum Zitat Barreto, P., Lynn, B., & Scott, M. (2004). On the selection of pairing-friendly groups. In Selected Areas in Cryptography—SAC’2003. Series LNCS (Vol. 3006, pp. 17–25). Berlin/Heidelberg: Springer-Verlag. Barreto, P., Lynn, B., & Scott, M. (2004). On the selection of pairing-friendly groups. In Selected Areas in Cryptography—SAC’2003. Series LNCS (Vol. 3006, pp. 17–25). Berlin/Heidelberg: Springer-Verlag.
23.
Zurück zum Zitat Szczechowiak, P., Kargl, A., Scott, M., & Collier, M. (2009). On the application of pairing based cryptography to wireless sensor networks. In ACM Wireless Network Security (WiSec), Zurich, Switzerland, March 2009. Szczechowiak, P., Kargl, A., Scott, M., & Collier, M. (2009). On the application of pairing based cryptography to wireless sensor networks. In ACM Wireless Network Security (WiSec), Zurich, Switzerland, March 2009.
24.
Zurück zum Zitat Dutta, R., Barua, R., & Sarkar, P. (2004). Pairing-based cryptography: A survey. Cryptology ePrint Archive Report 2004/064. Dutta, R., Barua, R., & Sarkar, P. (2004). Pairing-based cryptography: A survey. Cryptology ePrint Archive Report 2004/064.
25.
Zurück zum Zitat Sakai, R., Ohgishi, K., & Kasahara, M. (2000). Cryptosystems based on pairing. In Proceedings of 2000 Symposium on Cryptography and Information Security (SCIS2000), Okinawa, Japan, Jan. 2000. Sakai, R., Ohgishi, K., & Kasahara, M. (2000). Cryptosystems based on pairing. In Proceedings of 2000 Symposium on Cryptography and Information Security (SCIS2000), Okinawa, Japan, Jan. 2000.
Metadaten
Titel
How to secure multi-domain wireless mesh networks
verfasst von
Xiaoyan Zhu
Yuguang Fang
Yumin Wang
Publikationsdatum
01.07.2010
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 5/2010
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-009-0198-6

Weitere Artikel der Ausgabe 5/2010

Wireless Networks 5/2010 Zur Ausgabe

Neuer Inhalt