DocumentCode :
3141969
Title :
Securing wireless mesh networks with ticket-based authentication
Author :
Qazi, Shams ; Mu, Yi ; Susilo, Willy
Author_Institution :
Sch. of Comput. Sci. & Software Eng., Univ. of Wollongong, Wollongong, NSW
fYear :
2008
fDate :
15-17 Dec. 2008
Firstpage :
1
Lastpage :
10
Abstract :
A wireless mesh network (WMN) comprises of mesh access points (MAPs), mesh routers and mesh clients (MCs), where MAPs are almost static and form the back-bone of WMNs. MCs are wireless devices and dynamic in nature, communicating among themselves over possibly multi-hop paths, with or without the help of MAPs. Security has been a primary concern in order to provide protected communication in WMNs due to the open peer-to-peer network topology, shared wireless medium, stringent resource constraints and highly dynamic environment. These challenges clearly make a case for building multi-layer security solution that achieves both broad protection and desirable network performance. In this paper, we propose a cross-layer secure protocol for routing, data exchange and ARP problems (in case of LAN based upon WMNs). Our protocol is a ticket-based ad hoc on demand distance vector (TAODV) protocol, a secure routing protocol that is based on the design of ad hoc on demand distance vector (AODV) protocol. Due to availability of the backbone, we incorporate the authentication server (AS) for the issuance of tickets which are further used for secure routing, transfer of public keys and MAC addresses in one single step. With the transfer of public keys, source and destination can easily generate their shared secret key based upon fixed Diffie-Hellman key exchange protocol for data encryption and decryption. Our protocol is secure against both active and passive attacks.
Keywords :
ad hoc networks; cryptography; peer-to-peer computing; radio networks; routing protocols; telecommunication security; authentication server; cross-layer secure protocol; data decryption; data encryption; demand distance vector protocol; fixed Diffie-Hellman key exchange protocol; mesh routers; multihop paths; multilayer security solution; peer-to-peer network topology; routing protocol; stringent resource constraints; ticket-based ad hoc networks; ticket-based authentication; wireless mesh networks; Authentication; Communication system security; Data security; Local area networks; Network topology; Peer to peer computing; Protection; Public key; Routing protocols; Wireless mesh networks; AODV; ad hoc; authentication server; ticket based; wireless mesh networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Signal Processing and Communication Systems, 2008. ICSPCS 2008. 2nd International Conference on
Conference_Location :
Gold Coast
Print_ISBN :
978-1-4244-4243-0
Electronic_ISBN :
978-1-4244-4243-0
Type :
conf
DOI :
10.1109/ICSPCS.2008.4813771
Filename :
4813771
Link To Document :
بازگشت