Font Size: a A A

Research On Secure And Efficient Handover Authentication Protocols In Wireless Mesh Networks

Posted on:2020-05-06Degree:MasterType:Thesis
Country:ChinaCandidate:D C WangFull Text:PDF
GTID:2428330620956743Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
As a new wireless network architecture,Wireless Mesh Networks(WMNs)have rapidly developed into one of the key technologies of wireless networks.WMNs has great research value and broad application prospect because it has the advantages of low initial deployment cost,simple network maintenance,strong robustness,reliable service scope,etc.With the rapid development of wireless network technologies and applications,people are demanding higher network quality of service.Secure and efficient handover authentication protocol can effectively reduce handover delay and protect user privacy,and then improve the reliability,continuity and security of the network,thereby greatly improving the network quality of network services.In this thesis.three handover authentication protocols are proposed.An efficient handover authentication protocol based on user mobile prediction:In WMNs,a mesh client's handover history is recorded to predict his/her movement trajectory,and then handover authentication keys are pre-distributed to the mesh routers that the mesh client will switch to with a high probability.Then the mesh client generates a message authentication code according to the pre-distributed handover authentication key,and completes the handover authentication process after two handshakes,which can effectively reduce the handover authentication delay and storage cost.An anonymous handover authentication protocol based on identity blind signature:As channels are open in WMNs,it is necessary to protect the privacy of clients during the handover authentication process.Taking advantage of the identity-based blind signature technique,a mesh router generates a pseudonym for a client,and then the client only needs to use the pre-acquired pseudonym to complete the handover authentication process.In addition to guaranteeing the efficiency of handover authentication,the privacy of the client can be effectively protected.An anonymous handover authentication protocol supporting batch authentication:In a large-flow WMNs,the handover authentication key is previously transmitted to the neighboring mesh routers by using the group signature technique.Using the pre-distributed handover authentication key,a client can complete the handover authentication process after two handshakes,which can effectively improve the authentication efficiency when multiple clients request handover authentication at the same time.
Keywords/Search Tags:Wireless Mesh Networks, Handover Authentication, Privacy Preserving, Handover Efficiency
PDF Full Text Request
Related items