Abstract
Wireless LAN systems have been deployed for wireless internet services for hot spots, home, or offices. Recently, WLAN-Based Mesh Networking is developed with the benefit of easy deployment and easy configuration. Due to the characteristic of distributed environment, Wireless Mesh Networks(WMNs) need a new authentication scheme which allows multi-hop communication. In this paper, we propose a distributed authentication method which significantly eases the management burden and reduces the storage space on mesh points, thus enables the secure and easy deployment of WMNs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Akyildiz, I.F., Wang, X.: A Survey on Wireless Mesh Networks. IEEE Radio Comm. Mag., 23–30 (September 2005)
Yang, H., Luo, H., Ye, F., Lu, S., Zhang, L.: Security in mobile ad hoc networks: challenges and solutions. IEEE Wireless Communications 11(1), 38–47 (2004)
Perkins, C., Belding-Royer, E.: Ad-hoc on demand distance vector (AODV) routing. In: IEEE workshop in Mobile computing Systems and Applications (February 1999)
Buttyan, L., Hubaux, J.-P.: Report on a working session on security in wireless ad hoc networks. ACM Mobile Computing and Communications Review 7(1), 74–94 (2002)
Gong, L.: Increasing Availability and Security of an Authentication Service. IEEE Journal on Selected Areas in Communications 11(5) (June 1993)
Pabst, R., et al.: Relay-based deployment concepts for wireless and mobile broadband radio. IEEE Communications Magazine 42(9), 80–89 (2004)
Karof, C., Sastry, N., Wagner, D.: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. In: Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems (SenSys 2004) (November 2004)
Jolly, G., Kuscu, M.C., Kokate, P., Younis, M.: A Low-Energy Key Management Protocol for Wireless Sensor Networks. In: IEEE Symposium on Computers and Communications (2003)
Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings of Security and Privacy, 2003, pp. 197–213 (2003)
Menezes, A., et al.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security Protocols for Sensor Networks. In: Proceedings of Seventh Annual International Conference on Mobile Computing and Networks MOBICOM 2001 (2001)
IEEE Std. 802.11i, IEEE Standard for Telecommunications and Information Exchange between Systems-lan/man Specific Requirements, Part 11: Wireless Medium Access Control and Physical Layer (phy) Specifications Amendment 6: Medium Access Control (MAC) Security Enhancements (2004)
Capkin, S., Hubaux, J.P., Buttyan, L.: Mobility Helps Security in Ad hoc Networks. In: ACM MobiHoc (2003)
IEEE 802.11 TGs document IEEE P.802.11-04/662r14, http://www.ieee802.org/11
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, I., Lee, J., Arbaugh, W., Kim, D. (2008). Dynamic Distributed Authentication Scheme for Wireless LAN-Based Mesh Networks. In: Vazão, T., Freire, M.M., Chong, I. (eds) Information Networking. Towards Ubiquitous Networking and Services. ICOIN 2007. Lecture Notes in Computer Science, vol 5200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89524-4_64
Download citation
DOI: https://doi.org/10.1007/978-3-540-89524-4_64
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-89523-7
Online ISBN: 978-3-540-89524-4
eBook Packages: Computer ScienceComputer Science (R0)