360 Hits in 8.6 sec

Easy-to-Deploy Wireless Mesh Network System with User Authentication and WLAN Roaming Features

Tomo NIIZUMA, Hideaki GOTO
2017 IEICE transactions on information and systems  
This paper presents a novel WLAN roaming system over Wireless Mesh Networks (WMNs) that is useful for the use cases shown above.  ...  Wireless LAN (WLAN) roaming systems, such as eduroam, enable the mutual use of WLAN facilities among multiple organizations.  ...  Such a mechanism enables us to deploy a secure wireless network even when the upper network is unavailable or some authentication servers or proxies are down for some reasons.  ... 
doi:10.1587/transinf.2016edp7123 fatcat:cqgtwxay4ncqnmve5tijkc5qxy

An Efficient Authentication Method for Secure Access to Wireless Mesh Networks
무선망 보안 접속을 위한 효율적인 인증 기법

Ung Heo, Yu-Shan He, Kang-Soo You, Jae-Ho Choi
2011 The Journal of the Korea Contents Association  
In such networks, the service should be uninterrupted when roaming from one domain to another while the authentication for a secure access should be maintained.  ...  The wireless mesh networks are recently getting much attention for commercial applications.  ...  CONCLUSIONS In this paper, a re-authentication method for providing a secure roaming establishment between a mobile node and foreign domains of the wireless mesh network has been presented.  ... 
doi:10.5392/jkca.2011.11.9.017 fatcat:inz34zae3bgu3ocsdqifl72fru

Securing VoIP Services in Multi-Hop Wireless Mesh Networks

Yi Xian, Chin-Tser Huang
2007 2007 4th International Symposium on Wireless Communication Systems  
In this work, we focus on the security issues and present a new protocol for securing the voice traffic over the wireless mesh network, including the client authentication, intermediate mesh nodes authentication  ...  Recently, wireless mesh network has been considered as a good solution for VoIP services since it is easy to deploy and provides a larger area coverage.  ...  Then, we describe the possible attacks on VoIP services in wireless mesh networks in Section 3, and present our new protocol for securing VoIP over wireless mesh network in Section 4.  ... 
doi:10.1109/iswcs.2007.4392393 fatcat:34oqa2vx3beupnf7uaxzxpsivy

Secure and Privacy-Preserving Authentication Protocols for Wireless Mesh Networks [chapter]

Jaydip Sen
2012 Applied Cryptography and Network Security  
Authentication Protocols for Wireless Mesh Networks  ...  For roaming, it has three sub-protocols: an authentication protocol, a de-authentication protocol, and a roaming authentication protocol.  ...  Secure and Privacy-Preserving Authentication Protocols for Wireless Mesh Networks, Applied Cryptography and Network Security, Dr.  ... 
doi:10.5772/39176 fatcat:lvh54ipvizdo3drqtro2qbhece

Security issues in privacy and key management protocols of IEEE 802.16

Sen Xu, Manton Matthews, Chin-Tser Huang
2006 Proceedings of the 44th annual southeast regional conference on - ACM-SE 44  
Without physical boundaries, a wireless network faces many more security threats than a wired network does.  ...  Finally, we propose a security handover protocol that should be supported in the future 802.16e for mobility.  ...  Mutual authentication is the major contribution proposed by [8] , which enables SS to authenticate BS as well. In fact, the need for mutual authentication in wireless network is not a novel topic.  ... 
doi:10.1145/1185448.1185474 dblp:conf/ACMse/XuMH06 fatcat:4okkpgcfzzabjks5tnafpnrltq

A New Roaming Authentication Framework For Wireless Communication

2013 KSII Transactions on Internet and Information Systems  
Roaming authentication protocol is widely used in wireless network which can enable a seamless service for the mobile users.  ...  In this paper, we propose a new roaming authentication framework for wireless communication without the home server's participation.  ...  [9] proposed a mutual authentication and key exchange protocols for roaming services in wireless mobile networks.  ... 
doi:10.3837/tiis.2013.08.018 fatcat:xikltr77wnd5hdta7nmrbi4mfi

A Fast Handoff Technique in Wireless Mesh Network (FHT for WMN)

Geetanjali Rathee, Hemraj Saini
2016 Procedia Computer Science  
Whenever a mobile client leaves the range of its Home Mesh Router (HMR) and connects to a Foreign Mesh Router (FMR), mobile (roaming) client needs to authenticate itself as a legitimate node to its FMR  ...  in order to get the network services.  ...  Introduction Wireless Mesh Network (WMN) is a new cohort network that has occurred recently. It is a mishmash of ad-hoc and mesh networks 1 .  ... 
doi:10.1016/j.procs.2016.03.095 fatcat:jpn54doqhjgf5kri3yt6xw2yyi

An anonymous batch handover authentication protocol for big flow wireless mesh networks

Dongcheng Wang, Li Xu, Feng Wang, Qikui Xu
2018 EURASIP Journal on Wireless Communications and Networking  
Wireless mesh network (WMN), as a new generation of wireless network technology, has raised increasing concerns in recent years.  ...  Therefore, taking into consideration the openness of the wireless communication channel, the handover authentication protocols for WMNs have to be both efficient and secure, which remains a challenge.  ...  Conclusions In this paper, we propose a security and high efficiency anonymous handover authentication protocol for wireless mesh networks.  ... 
doi:10.1186/s13638-018-1217-z fatcat:q2z3szr7jvcptfjmwf5an44tda

A New Ticket-Based Authentication Mechanism for Fast Handover in Mesh Network

Yan-Ming Lai, Pu-Jen Cheng, Cheng-Chi Lee, Chia-Yi Ku, Muhammad Khurram Khan
2016 PLoS ONE  
In 2013, Li et al. proposed a fast handover authentication mechanism for wireless mesh network (WMN) based on tickets. Unfortunately, Li et al.'s work came with some weaknesses.  ...  Wireless Mesh Network.  ...  Acknowledgments The authors would like to thank the anonymous reviewers for their valuable comments and suggestions.  ... 
doi:10.1371/journal.pone.0155064 pmid:27171160 pmcid:PMC4865210 fatcat:76yhnvss2jdpvjx6y7tki7gjwi

A Novel ID-based Multi-domain Handover Protocol for Mesh Points in WMNs

2015 KSII Transactions on Internet and Information Systems  
Wireless mesh networks (WMNs) provide an efficient and flexible method to the field of wireless networking, but also bring many security issues.  ...  The authentication server is not involved in our handover authentication protocol so that mutual authentication can be completed directly by the mesh points.  ...  A non-repudiable authentication scheme for wireless mesh networks was proposed in paper [18] .  ... 
doi:10.3837/tiis.2015.07.010 fatcat:nj3xgqw7mze6pfqj4mp24o5q3q

Preserving Identity Privacy in Wireless Mesh Networks

Md. Shariful Islam, Md. Abdul Hamid, Choong Seon Hong, Beom-Hwan Chang
2008 International conference on information networking (ICOIN)  
Wireless mesh network (WMN) has emerged as a key technology for a numerous number of applications because of its ease of deployment, low cost and flexibility of use.  ...  In this paper, we present an anonymous authentication scheme between mesh client and mesh router for preserving identity privacy and security in data communication in WMN.  ...  We also intend to focus on the case of a roaming mesh client of a different operator that wants to authenticate anonymously in a visiting mesh network.  ... 
doi:10.1109/icoin.2008.4472767 dblp:conf/icoin/IslamHHC08 fatcat:57miekhqabgupb3wnrqt23yiny

Fast authentication for mobility support in wireless mesh networks

Celia Li, Uyen Trang Nguyen
2011 2011 IEEE Wireless Communications and Networking Conference  
We propose new authentication protocols that support fast hand-off for real-time applications such as voice over IP and audio/video conferencing in wireless mesh networks (WMNs).  ...  A client and a mesh access point (MAP) mutually authenticate each other using one-hop communications. The central authentication server is not involved during the handover process.  ...  They are needed for mutual authentication between a client with a MAP when the client signs in the network, or roams to another MAP. A.  ... 
doi:10.1109/wcnc.2011.5779299 dblp:conf/wcnc/LiN11 fatcat:mxnijh5a3bdmhhyqoipaggcp7y

Anonymous authentication scheme based on identity-based proxy group signature for wireless mesh network

Tianhan Gao, Fangting Peng, Nan Guo
2016 EURASIP Journal on Wireless Communications and Networking  
Access security is the key obstacle of the rapid popularization of wireless mesh network (WMN). We suggest the proxy group signature scheme based on identity in this paper.  ...  Performance and security analysis show that the scheme in this paper is efficient and resilient to a series of security and anonymity attacks.  ...  Introduction Compared with traditional wireless self-organized network (MANET), wireless mesh network (WMN) owns higher reliability, larger data throughput, and lower disturbance, as well as stronger scalability  ... 
doi:10.1186/s13638-016-0685-2 fatcat:fly7yzgypbgjlnxcdkujglh6ai

Security and Privacy Issues in Wireless Mesh Networks: A Survey [article]

Jaydip Sen
2013 arXiv   pre-print
This book chapter identifies various security threats in wireless mesh network (WMN).  ...  The chapter then presents a brief discussion on various trust management approaches for WMNs since trust and reputation-based schemes are increasingly becoming popular for enforcing security in wireless  ...  Hybrid wireless mesh protocol (HWMP) Bahr has proposed a hybrid wireless mesh protocol (HWMP) [90] . It is the default routing protocol for IEEE 802.11s WLAN mesh networking.  ... 
arXiv:1302.0939v1 fatcat:4bxooy2dubeopa3qbcyg5yvi3y

Secure roaming and infrastructure sharing for multi-operator WMNs

André Egners, Ulrike Meyer
2013 Proceedings of the 28th Annual ACM Symposium on Applied Computing - SAC '13  
While previous security research in the area mainly focused single-operator networks, this paper proposes a comprehensive security architecture for multioperator wireless mesh networks.  ...  Wireless mesh networks consist of a wireless infrastructure of mesh routers which are connected to the Internet via mesh gateways.  ...  INTRODUCTION Wireless Mesh Networks (WMNs) consist of a wireless infrastructure of Mesh Routers (MRs) which are connected to the Internet via Mesh Gateways (MGs).  ... 
doi:10.1145/2480362.2480700 dblp:conf/sac/EgnersM13 fatcat:5es54h2sqzempeqhpuxia4zzry
« Previous Showing results 1 — 15 out of 360 results