Abstract
The research issues of large scale wireless mesh networks (WMNs) have attracted increasing attention due to the excellent properties of WMNs. Although some proposals for WMN security framework with different security aspects have been put forward recently, it is a challenging issue of employing uniform public key cryptography to maintain trust relationships flexibly among domains and to achieve key-escrow-free anonymous access control. In this paper, a unified security framework (USF) for multi-domain wireless mesh networks is proposed, which unifies id-based encryption and certificateless signature in a single public key cryptography context. Trust relationship between different domains and anonymous access control of wireless clients can be realized by employing of cryptography operations on bilinear groups. To achieve perfect forward secrecy and attack-resilience, trust domain construction methods and authentication protocols are devised within the security framework without key escrow.
Keywords
Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Zhu, H., Lin, X., Lu, R., Ho, P., Shen, X.: SLAB: A Secure Localized Authentication and Billing Scheme for Wireless Mesh Networks. IEEE Trans. Wireless Communications 7(10), 3858–3868 (2008)
Ren, K., et al.: PEACE: A Novel Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks. IEEE Trans. Parallel and Distributed Systems 21(2), 203–215 (2010)
Zhang, Y., Fang, Y.: ARSA: An Attack-Resilient Security Architecture for Multihop Wireless Mesh Networks. IEEE J. Selected Areas Comm. 24(10), 1916–1928 (2006)
Sun, J., Zhang, C., Zhang, Y., Fang, Y.: SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks. IEEE Trans. Dependable and Secure Computing 8(2), 295–307 (2011)
Shamir, A.: Identity-based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Al-Riyami, S.S., Paterson, K.G.: Certificateless Public Key Cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003)
Dutta, R., Barua, R., Sarkar, P.: Pairing-based Cryptography: A Survey. Cryptology ePrint Archive Rep. 2004/064 (2004)
Huang, X., Mu, Y., Susilo, W., Wong, D., Wu, W.: Certificateless Signature Revisited. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol. 4586, pp. 308–322. Springer, Heidelberg (2007)
IEEE Standard Supplement to Standard for Telecommunications and Information Exchange between Systems—LAN/MAN Specific Requirements—Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Specification for Enhanced Security: IEEE 802.11i. IEEE, Piscataway (2004)
Canetti, R., Krawczyk, H.: Analysis of Key-exchange Protocols and Their Use for Building Secure Channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 453–474. Springer, Heidelberg (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wang, Z., Ma, M., Liu, W., Wei, X. (2011). A Unified Security Framework for Multi-domain Wireless Mesh Networks. In: Qing, S., Susilo, W., Wang, G., Liu, D. (eds) Information and Communications Security. ICICS 2011. Lecture Notes in Computer Science, vol 7043. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25243-3_26
Download citation
DOI: https://doi.org/10.1007/978-3-642-25243-3_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25242-6
Online ISBN: 978-3-642-25243-3
eBook Packages: Computer ScienceComputer Science (R0)