Skip to main content

Dynamic Distributed Authentication Scheme for Wireless LAN-Based Mesh Networks

  • Conference paper
Information Networking. Towards Ubiquitous Networking and Services (ICOIN 2007)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 5200))

Included in the following conference series:

Abstract

Wireless LAN systems have been deployed for wireless internet services for hot spots, home, or offices. Recently, WLAN-Based Mesh Networking is developed with the benefit of easy deployment and easy configuration. Due to the characteristic of distributed environment, Wireless Mesh Networks(WMNs) need a new authentication scheme which allows multi-hop communication. In this paper, we propose a distributed authentication method which significantly eases the management burden and reduces the storage space on mesh points, thus enables the secure and easy deployment of WMNs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akyildiz, I.F., Wang, X.: A Survey on Wireless Mesh Networks. IEEE Radio Comm. Mag., 23–30 (September 2005)

    Google Scholar 

  2. Yang, H., Luo, H., Ye, F., Lu, S., Zhang, L.: Security in mobile ad hoc networks: challenges and solutions. IEEE Wireless Communications 11(1), 38–47 (2004)

    Article  Google Scholar 

  3. Perkins, C., Belding-Royer, E.: Ad-hoc on demand distance vector (AODV) routing. In: IEEE workshop in Mobile computing Systems and Applications (February 1999)

    Google Scholar 

  4. Buttyan, L., Hubaux, J.-P.: Report on a working session on security in wireless ad hoc networks. ACM Mobile Computing and Communications Review 7(1), 74–94 (2002)

    Article  Google Scholar 

  5. Gong, L.: Increasing Availability and Security of an Authentication Service. IEEE Journal on Selected Areas in Communications 11(5) (June 1993)

    Google Scholar 

  6. Pabst, R., et al.: Relay-based deployment concepts for wireless and mobile broadband radio. IEEE Communications Magazine 42(9), 80–89 (2004)

    Article  Google Scholar 

  7. Karof, C., Sastry, N., Wagner, D.: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. In: Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems (SenSys 2004) (November 2004)

    Google Scholar 

  8. Jolly, G., Kuscu, M.C., Kokate, P., Younis, M.: A Low-Energy Key Management Protocol for Wireless Sensor Networks. In: IEEE Symposium on Computers and Communications (2003)

    Google Scholar 

  9. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings of Security and Privacy, 2003, pp. 197–213 (2003)

    Google Scholar 

  10. Menezes, A., et al.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)

    Book  MATH  Google Scholar 

  11. Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security Protocols for Sensor Networks. In: Proceedings of Seventh Annual International Conference on Mobile Computing and Networks MOBICOM 2001 (2001)

    Google Scholar 

  12. IEEE Std. 802.11i, IEEE Standard for Telecommunications and Information Exchange between Systems-lan/man Specific Requirements, Part 11: Wireless Medium Access Control and Physical Layer (phy) Specifications Amendment 6: Medium Access Control (MAC) Security Enhancements (2004)

    Google Scholar 

  13. Capkin, S., Hubaux, J.P., Buttyan, L.: Mobility Helps Security in Ad hoc Networks. In: ACM MobiHoc (2003)

    Google Scholar 

  14. IEEE 802.11 TGs document IEEE P.802.11-04/662r14, http://www.ieee802.org/11

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, I., Lee, J., Arbaugh, W., Kim, D. (2008). Dynamic Distributed Authentication Scheme for Wireless LAN-Based Mesh Networks. In: Vazão, T., Freire, M.M., Chong, I. (eds) Information Networking. Towards Ubiquitous Networking and Services. ICOIN 2007. Lecture Notes in Computer Science, vol 5200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89524-4_64

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-89524-4_64

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-89523-7

  • Online ISBN: 978-3-540-89524-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics