Abstract
WLAN mesh, the technological extension of WLAN, solves the problem for WLAN of limited coverage, relatively low bandwidth, etc., and has a promising prospect. Due to its characteristics and advantages of flexible networking, auto-configuration, high mobility, and fitness for backbone networks, wireless mesh network can provide fast, secure and reliable services. In this chapter, based on the analysis of mesh authentication protocols, an identity based authentication protocol is proposed. Consider that fast handoff and roaming of mesh devices are not supported by the existing access authentication protocols in WLAN mesh, and that the demand of users for identity protection is not satisfied in the roaming process, a comprehensive solution for the WLAN mesh network-secure access is given. The proposed access authentication protocol only needs four rounds to realize the authentication and key confirmation, without the necessity of four-way handshake for the key confirmation, based on which, the MP (Mesh Point) fast handoff and roaming authentication protocols are provided. The provable security analysis and performance simulation using NS2 shows that the proposed protocols are universally composable, and that they perform better than the existing ones. Finally, a simple mesh authentication system is designed and implemented for the purpose of verification and realization of authentication schemes in the wireless mesh network.
Preview
Unable to display preview. Download preview PDF.
References
IEEE Computer Society. IEEE 802.11 TGs ESS mesh Networking proposal, snowmesh. New York: IEEE, 2007.
IEEE Computer Society. IEEE 802.11 TGs Proposal, seemesh. New York: IEEE, 2007.
IEEE Computer Society. EEE 802.11 TGs Proposal, joint Seemesh/Wi-Mesh. New York: IEEE, 2007.
IEEE Computer Society. IEEE 802.11s/D1.07, amendment to standard for information technology-telecommunications and information exchange between systems-LAN/MAN Specific requirements Part 11: wireless medium access control (MAC) and physical layer (PHY) specifications, amendment: ESS mesh networking. New York: IEEE, 2007.
Goldwasser S, Micali S, Rivest R, et al. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing, 1998, 17(2): 281–308.
University of California at Berkeley. Network Simulator (NS-2.26). 2008. http://www.isi.edu/nsnam/ns.
Yang H Y. The analysis and implementation of wireless mesh network access authentication techniques. Xi’an: School of computer, Xidian University, 2007.
Malinen J. Host AP driver for Intersil prism2/2.5/3, hostapd and WPA supplicant. http://hostap.epitest.fi/.
Mini S J. How to on flashing interlsil prism chipsets. http://linux.junsun.net/intersil-prism/.
The FreeRADIUS Project. Free RADIUS server tools. http://www.freeradius.org/.
Akyildiz I F, Wang X D, Wang W L, et al. Wireless mesh networks: a surrey computer networks. 2005, 47: 445–487.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2009 Higher Education Press, Beijing and Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Ma, J., Wang, C., Ma, Z. (2009). Security Protocols in WLAN Mesh. In: Security Access in Wireless Local Area Networks. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00941-9_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-00941-9_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-00940-2
Online ISBN: 978-3-642-00941-9