Advertisement

Probabilistic Verification Scenarios with Reduced Authentication Delay for Handoff Clients in Mesh Networks

  • Geetanjali RatheeEmail author
  • Naveen Jaglan
  • Hemraj Saini
  • Samir Dev Gupta
  • Binod Kumar Kanaujia
Article
  • 37 Downloads

Abstract

In this paper, we have proposed a secure handoff procedure by generating and assessing the tickets for each mesh client which are divided among various zones of mesh routers depending on their transmission range. Further, a trusted third party authentication server is proposed that is responsible for generating and assigning the tickets of each mesh client which are stored distributively at mesh routers. However, during the mobility whenever the range of current serving mesh router decreases, the mesh client needs to connect to a foreign mesh router by authenticating itself in order to continue its network services. The foreign mesh router validates the authenticity of its handoff mesh client by verifying its ticket. The proposed mechanism reduces the potential issue of storage overhead and security threats at mesh clients as all the tickets are stored distributively in the database of each mesh router. The proposed technique is validated with a commercial simulator NS2 over certain network parameters and different probabilistic scenarios of authentication.

Keywords

Handoff Wireless mesh network Security threats Probabilistic authentication techniques Authentication delay 

Notes

References

  1. 1.
    Zhu, L., Yu, F. R., Tang, T., & Ning, B. (2017). Handoff performance improvements in an integrated train-ground communication system based on wireless network virtualization. IEEE Transactions on Intelligent Transportation Systems, 18(5), 1165–1178.Google Scholar
  2. 2.
    Zhou, Z., Zhang, H., & Sun, Z. (2017). An improved privacy-aware handoff authentication protocol for VANETs. Wireless Personal Communications, 97(3), 3601–3618.Google Scholar
  3. 3.
    Khan, S., & Pathan, A. S. K. (2013). Wireless networks and security issues, challenges and research trends. London: Springer.Google Scholar
  4. 4.
    Dykema, K. A., Bouws, B. K., Doman, T. J., Leete, III, L. F. Schenck, W. C., & Guthrie, W. E. (2013). Wireless mesh network. U.S. Patent 8,274,928.Google Scholar
  5. 5.
    Wang, Z., Luo, Z. X., Zhang, J. L., & Saucan, E. (2016). ARAP++: An extension of the local/global approach to mesh parameterization. Frontiers of Information Technology and Electronic Engineering, 17(6), 501–515.Google Scholar
  6. 6.
    Srivatsa, A. M., & Xie, J. (19 May 2008). A performance study of mobile handoff delay in IEEE 802.11-based wireless mesh networks. In Proceedings of 1st international conference on communications (pp. 2485–2489). Beijing: IEEE.Google Scholar
  7. 7.
    Khabiri, M., & Ghaffari, A. (2018). Energy-aware clustering-based routing in wireless sensor networks using cuckoo optimization algorithm. Wireless Personal Communications, 98(3), 2473–2495.Google Scholar
  8. 8.
    Babu, M. R., & Usha, G. (2016). A novel honey pot based detection and isolation approach (NHBADI) to detect and isolate black hole attacks in MANET. Wireless Personal Communications, 90(2), 831–845.Google Scholar
  9. 9.
    Poongodi, T., & Karthikeyan, M. (2016). Localized secure routing architecture against cooperative black hole attack in mobile ad hoc networks. Wireless Personal Communications, 90(2), 1039–1050.Google Scholar
  10. 10.
    Purohit, K. C., Dimri, S. C., & Jasola, S. (2017). Mitigation and performance analysis of routing protocols under black-hole attack in vehicular ad hoc network (VANET). Wireless Personal Communications, 97(4), 5099–5114.Google Scholar
  11. 11.
    Anita, X., Bhagyaveni, M. A., & Manickam, J. M. L. (2015). Collaborative lightweight trust management scheme for wireless sensor networks. Wireless Personal Communications, 80(1), 117–140.Google Scholar
  12. 12.
    Labraoui, N., Gueroui, M., & Sekhri, L. (2016). A risk-aware reputation-based trust management in wireless sensor networks. Wireless Personal Communications, 87(3), 1037–1055.Google Scholar
  13. 13.
    Rathee, G., Saini, H., & Singh, G. (2018). Aspects of trusted routing communication in smart networks. Wireless Personal Communications, 98(2), 2367–2387.Google Scholar
  14. 14.
    Luo, M., & Wan, Y. (2018). An enhanced certificate less signcryption in the standard model. Wireless Personal Communications, 98(3), 2693–2709.Google Scholar
  15. 15.
    Bala, S., Sharma, G., & Verma, A. K. (2016). PF-ID-2PAKA: Pairing free identity-based two-party authenticated key agreement protocol for wireless sensor networks. Wireless Personal Communications, 87(3), 995–1012.Google Scholar
  16. 16.
    Cato, N. (2016). On next generation network security. IEEE Network, 31(2), 1–2.MathSciNetGoogle Scholar
  17. 17.
    Mansfield-Devine, S. (2017). File-less attacks: Compromising targets without malware. Network Security, 17(4), 7–11.Google Scholar
  18. 18.
    Xie, J., Hu, Y. P., Gao, J. T., & Gao, W. (2016). Efficient identity-based signature over NTRU lattice. Frontiers of Information Technology and Electronic Engineering, 17(2), 135–142.Google Scholar
  19. 19.
    Jiang, Q., Ma, J., Lu, X., & Tian, Y. (2015). An efficient two-factor user authentication scheme with unlink ability for wireless sensor networks. Journal of Peer-to-Peer Networking and Applications, 8(6), 1070–1081.Google Scholar
  20. 20.
    Shrivastava, G., Sharma, K., & Rai, S. (2010). The detection and defense of DoS and DDos attack: A technical overview. Proceedings of ICC, 27, 274–282.Google Scholar
  21. 21.
    Abbas, F., & Oh, H. (2014). A step towards user privacy while using location-based services. Journal of Information Processing Signals, 10(4), 618–627.Google Scholar
  22. 22.
    Zhang, H., Cheng, P., Shi, L., & Chen, J. (2016). Optimal DoS attack scheduling in wireless networked control system. IEEE Transactions on Control Systems Technology, 24(3), 843–852.Google Scholar
  23. 23.
    Tseng, Y. M. (2009). USIM-based EAP-TLS authentication protocol for wireless local area networks. Computer Standards & Interfaces, 31(1), 128–136.Google Scholar
  24. 24.
    Jayaraman, P., Lopez, R., Ohba, Y., Parthasarathy, M., & Yegin, A. (2008). Protocol for carrying authentication for network access (PANA). Framework no. RFC 5193.Google Scholar
  25. 25.
    Park, C., Hur, J., Kim, C., Shin, Y. J., & Yoon, H. (2006). Pre-authentication for fast handoff in wireless mesh networks with mobile APs. In Proceedings of international workshop on information security applications (pp. 349–363). Berlin: Springer.Google Scholar
  26. 26.
    Huang, C. M., & Li, J. W. (2009). A cluster-chain-based context transfer mechanism for fast basic service set transition in the centralized wireless LAN architecture. Wireless Communications and Mobile Computing, 9(10), 1387–1401.Google Scholar
  27. 27.
    Ruj, S., Nayak, A., & Stojmenovic, I. (2013). Pairwise and triple key distribution in wireless sensor networks with applications. IEEE Transactions on Computers, 62(11), 2224–2237.MathSciNetzbMATHGoogle Scholar
  28. 28.
    Dalal, R., Singh, Y., & Khari, M. (2012). A review on key management schemes in MANET. International Journal of Distributed and Parallel Systems, 3(4), 165–172.Google Scholar
  29. 29.
    Fu, A., Zhang, Y., Zhu, Z., & Liu, X. (2010). A fast handover authentication mechanism based on ticket for IEEE 802.16m. IEEE Communications Letters, 14(12), 1134–1136.Google Scholar
  30. 30.
    Fu, A., Zhang, Y., Zhu, Z., Jing, Q., & Feng, J. (2012). An efficient handover authentication scheme with privacy preservation for IEEE 802.16m network. Computers and Security, 31(6), 741–749.Google Scholar
  31. 31.
    Xu, L., He, Y., Chen, X., & Huang, X. (2014). Ticket-based handoff authentication for wireless mesh networks. Computer Networks, 73, 185–194.Google Scholar
  32. 32.
    Li, J., Chen, X., Li, M., Li, J., Lee, P. P., & Lou, W. (2014). Secure de-duplication with efficient and reliable convergent key management. IEEE Transactions on Parallel and Distributed Systems, 25(6), 1615–1625.Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringJaypee University of Information TechnologyWaknaghatIndia
  2. 2.Department of Electronics and Communication EngineeringJaypee University of Information TechnologyWaknaghatIndia
  3. 3.School of Computational and Integrative SciencesJawaharlal Nehru University (J.N.U.)New DelhiIndia

Personalised recommendations