Skip to main content

Abstract

WLAN mesh, the technological extension of WLAN, solves the problem for WLAN of limited coverage, relatively low bandwidth, etc., and has a promising prospect. Due to its characteristics and advantages of flexible networking, auto-configuration, high mobility, and fitness for backbone networks, wireless mesh network can provide fast, secure and reliable services. In this chapter, based on the analysis of mesh authentication protocols, an identity based authentication protocol is proposed. Consider that fast handoff and roaming of mesh devices are not supported by the existing access authentication protocols in WLAN mesh, and that the demand of users for identity protection is not satisfied in the roaming process, a comprehensive solution for the WLAN mesh network-secure access is given. The proposed access authentication protocol only needs four rounds to realize the authentication and key confirmation, without the necessity of four-way handshake for the key confirmation, based on which, the MP (Mesh Point) fast handoff and roaming authentication protocols are provided. The provable security analysis and performance simulation using NS2 shows that the proposed protocols are universally composable, and that they perform better than the existing ones. Finally, a simple mesh authentication system is designed and implemented for the purpose of verification and realization of authentication schemes in the wireless mesh network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. IEEE Computer Society. IEEE 802.11 TGs ESS mesh Networking proposal, snowmesh. New York: IEEE, 2007.

    Google Scholar 

  2. IEEE Computer Society. IEEE 802.11 TGs Proposal, seemesh. New York: IEEE, 2007.

    Google Scholar 

  3. IEEE Computer Society. EEE 802.11 TGs Proposal, joint Seemesh/Wi-Mesh. New York: IEEE, 2007.

    Google Scholar 

  4. IEEE Computer Society. IEEE 802.11s/D1.07, amendment to standard for information technology-telecommunications and information exchange between systems-LAN/MAN Specific requirements Part 11: wireless medium access control (MAC) and physical layer (PHY) specifications, amendment: ESS mesh networking. New York: IEEE, 2007.

    Google Scholar 

  5. Goldwasser S, Micali S, Rivest R, et al. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing, 1998, 17(2): 281–308.

    Article  MathSciNet  Google Scholar 

  6. University of California at Berkeley. Network Simulator (NS-2.26). 2008. http://www.isi.edu/nsnam/ns.

    Google Scholar 

  7. Yang H Y. The analysis and implementation of wireless mesh network access authentication techniques. Xi’an: School of computer, Xidian University, 2007.

    Google Scholar 

  8. Malinen J. Host AP driver for Intersil prism2/2.5/3, hostapd and WPA supplicant. http://hostap.epitest.fi/.

    Google Scholar 

  9. Mini S J. How to on flashing interlsil prism chipsets. http://linux.junsun.net/intersil-prism/.

    Google Scholar 

  10. The FreeRADIUS Project. Free RADIUS server tools. http://www.freeradius.org/.

    Google Scholar 

  11. Akyildiz I F, Wang X D, Wang W L, et al. Wireless mesh networks: a surrey computer networks. 2005, 47: 445–487.

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Higher Education Press, Beijing and Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Ma, J., Wang, C., Ma, Z. (2009). Security Protocols in WLAN Mesh. In: Security Access in Wireless Local Area Networks. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00941-9_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-00941-9_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-00940-2

  • Online ISBN: 978-3-642-00941-9

Publish with us

Policies and ethics