Font Size: a A A

Study On Efficient Handover Authentication Scheme In Wireless Mesh Network

Posted on:2018-02-15Degree:MasterType:Thesis
Country:ChinaCandidate:B T SuFull Text:PDF
GTID:2348330542473133Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the rapid development of the wireless network,wireless Mesh network as a new kind of network structure has a broad application prospect.However,the security has been one of the important factors which restricts the development of the wireless Mesh network.As an effective method to address security issues in wireless Mesh networks,the handover authentication technology should solve the security problem of authentication,as well as have high efficiency so as to meet the requirements of today's network.According to the characteristics of Mesh network properties,we design 3 han?dover authentication protocols for different application requirements:A fast au-thentication protocol based on Diffie-Hellman,a anonymity handover authentication protocol based on group signature and a handover authentication protocol support batch verification and privacy-preserving respectively.A fast authentication protocol based on Diffie-Hellman:the fast login authenti-cation and fast handover authentication schemes based on Diffie-Hellman algorithm are proposed.In login authentication process,the Mesh client is authenticated suc-cessfully with 4 rounds of message exchange by pre-distribution of tickets,followed by calculating their shared handover key and delivering it to any of its neighbors.With the shared key,the handover authentication process takes a 3-message hand-shake to accomplish mutual authentication when clients move to a new router.Dur-ing the handover process,the authentication server does not need to be involved.The proposed schemes have lower authentication latency and higher authentication efficiency.A anonymity handover authentication protocol based on group signature:In the protocol,the clients only need to use the precomputed key to accomplish handover authentication.After completing authentication,the client first precomputes the secret key for next handover authentication,and then encrypts it and sends it to the current access router.The router decrypts the message and generates a group signature file sending to neighbor routers.Routers can only determine the legitimacy of users but not the identity and the authentication frequency from the same client,which fully protects the security of users' identity,position and trajectories.A handover authentication protocol supporting batch verification and privacy-preserving:AS chooses a family of unlinkable pseudo-IDs for each client and com-putes the secret key before clients join the network.The roaming clients pick an unused pseudo-IDs to accomplish handover authentication.The handover process does not require complex calculation and has higher authentication efficiency.These unlinkable pseudo-IDs are used in handover authentication phases for the purpose of privacy protection.In multi-user scenarios,the protocol will choose batch au-thentication strategy.Compared with the traditional authentication,the efficiency of batch authentication strategy is greatly increased.
Keywords/Search Tags:Mesh network, handover authentication, security, authentication efficiency, privacy-preserving
PDF Full Text Request
Related items