Skip to main content

A Secure Authentication Scheme in Multi-operator Domain (SAMD) for Wireless Mesh Network

  • Conference paper
  • First Online:
Proceedings of the International Conference on Data Engineering and Communication Technology

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 468))

Abstract

Wireless mesh network (WMN) is considered to be an evolving technique because of self-configuration and adaptive features, it supports large-scale network especially in an organization and academics. As with any network, communication among nodes plays an important role, when two nodes in a network communicate with each other via the Internet, secure authentication is an imperative challenge. In literature, there are many approaches that have been suggested to deliver a secure authentication between nodes in wireless mesh network (WMN), however, all these outlines contain some disadvantages, i.e. management cost of the public key and system complexity. Our suggested proposed approach is dealing with one of the wireless mesh network challenges, i.e. Mutual authentication. Here in this we have considered the three authentication techniques, i.e. Inter-, Intra- and Inter-Operator domain authentication. SAMD (Secure Authentication Scheme in Multi-Operator Domain) hides the location, communication path and network access and apart from that it will resist to the adversary, key forgery and modification attack. As a result, we have assessed the performance of the proposed design in terms of Authentication cost, Encryption cost, Key validation, Key Generation, Throughput and System Delay, which indicates our scheme more efficient than other schemes. Results show that it will efficiently work in real-time traffic.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. I.F Akyildiz, Xudong Wang and Weilin Wang, “A Survey on Wireless Mesh Networks.”, IEEE Radio Communications, Volume 47(4), (2005).

    Google Scholar 

  2. Ben Salem, N. Hubaux, “Securing Wireless Mesh Networks”, IEEE Wireless Communications, 13(2), pp 50–55 (2006).

    Google Scholar 

  3. L. Santhanam, B. Xie, D.P Agrawal, “Secure and Efficient Authentication in Wireless Mesh Networks using Merkle Trees”, 33rd IEEE Conference on Local Computer Networks, LCN (2008).

    Google Scholar 

  4. Y. Fu, J. He, R. Wang, R. Li, “Mutual Authentication in Wireless Mesh Networks.” In: Proceedings of ICC (2008).

    Google Scholar 

  5. Y. Zhang, Y. Fang, “ARSA: an Attack-Resilient Security Architecture for Multi-hop Wireless Mesh Networks”, IEEE Journal on Selected Areas in Communications, 24(10), (2006).

    Google Scholar 

  6. Ninni Singh and Hemraj Saini, “Formal Verification on Secure Authentication in Wireless Mesh Network”, Second International Conference on Computer and Communication Technologies, in Springer AISC series, (2015).

    Google Scholar 

  7. Ford Long Wong, Hoon Wei Lim, “Identity-based and inter-domain password authenticated key exchange for lightweight clients”, in: AINAW’07: Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops, IEEE Computer Society, Washington, DC, USA, 2007, pp 544–550.

    Google Scholar 

  8. Her-Tyan Yeh, Hung-Min Sun, Password authenticated key exchange protocols among diverse network domains, Computers & Electrical Engineering, 31(3) (2005) 175–189.

    Google Scholar 

  9. Ren-Junn Hwang, Feng-Fu Su, “A new efficient authentication protocol for mobile networks”, Computer Standards & Interfaces 28 (2) (2005) 241–252.

    Google Scholar 

  10. Summit R. Tuladhar, Carlos E. Caicedo, James B.D. Joshi, “Inter-domain authentication for seamless roaming in heterogeneous wireless networks”, in: SUTC’08: Proceedings of the 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, SUTC 2008, IEEE Computer Society, Washington, DC, USA, 2008, pp. 249–255.

    Google Scholar 

  11. Catherine Meadows, “Formal methods for cryptographic protocol analysis: Emerging issues and trends”, IEEE Journal on Selected Areas in Communications 21 (2) (2003) 44–45.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ninni Singh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Science+Business Media Singapore

About this paper

Cite this paper

Ninni Singh, Gunjan Chhabra, Singh, K.P., Hemraj Saini (2017). A Secure Authentication Scheme in Multi-operator Domain (SAMD) for Wireless Mesh Network. In: Satapathy, S., Bhateja, V., Joshi, A. (eds) Proceedings of the International Conference on Data Engineering and Communication Technology. Advances in Intelligent Systems and Computing, vol 468. Springer, Singapore. https://doi.org/10.1007/978-981-10-1675-2_35

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-1675-2_35

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-1674-5

  • Online ISBN: 978-981-10-1675-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics