Filters








1,418 Hits in 7.1 sec

An authentication scheme for QoS-aware multi-operator maintained wireless mesh networks

Levente Buttyan, Laszlo Dora
2009 2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops  
Here, we propose two certificate based authentication schemes such that the authentication is performed locally between the access point and the mesh client.  ...  Many proposed fast authentication schemes rely on trust models that are not appropriate in multi-operator environment.  ...  This work was supported in part by the European Commission in the context of the 7th Framework Programme through the EU-MESH Project (www.eu-mesh.eu) and in part by the Mobile Innovation Center (www.mik.bme.hu  ... 
doi:10.1109/wowmom.2009.5282425 dblp:conf/wowmom/ButtyanD09 fatcat:qcdcvg3awvcpzb4fvxzbq3uxfy

A Survey on Wireless Mesh Networks and its Security Issues

R. Regan, J. Martin Leo Manickam
2016 International Journal of Security and Its Applications  
Despite all these fringe benefits, one of the greatest challenges in wireless mesh networks is that they are exposed to a number of hazardous security vulnerabilities.  ...  Infrastructure-less / Client WMNs Infrastructure-less mesh networks are one-tier networks in which client nodes participate in routing architecture and construct the real network.  ...  The scheme is an extension of the MOCA protocol [34] in which a collection of nodes selected on several parameters acts as the certificate authority and provides an attack resilient and robust certificate  ... 
doi:10.14257/ijsia.2016.10.3.35 fatcat:qxmsisdkefcktin6g7gazseinm

On Optimization and Security of Multimedia Communication in Wireless Mesh Networks

Fazl E-Hadi, Fahad T. Bin Muhaya, Atif Naseer
2011 International Journal of Multimedia and Image Processing  
Authors believe that the FBR is the better choice for the multimedia communication in wireless mesh networks.  ...  Network traffic cost optimization and its security in wireless mesh network is a challenging task.  ...  Furthermore to the best of our knowledge no one has studies the security of multimedia communication using the field based routing in wireless mesh networks.  ... 
doi:10.20533/ijmip.2042.4647.2011.0005 fatcat:miu6rdnulfgclbihog6hdl22wi

Security and Privacy Issues in Wireless Mesh Networks: A Survey [article]

Jaydip Sen
2013 arXiv   pre-print
This book chapter identifies various security threats in wireless mesh network (WMN).  ...  The chapter then presents a brief discussion on various trust management approaches for WMNs since trust and reputation-based schemes are increasingly becoming popular for enforcing security in wireless  ...  In deployment scenarios (for instance in a wireless mesh network that provides access to the Internet), large proportion of the traffic in a mesh network are destined for only one or a few mesh points.  ... 
arXiv:1302.0939v1 fatcat:4bxooy2dubeopa3qbcyg5yvi3y

Trust Agreement in Wireless Mesh Networks [chapter]

Andreas Noack
2011 Lecture Notes in Computer Science  
Establishing a trust relationship in decentralized wireless mesh networks (WMN) is an open question to date.  ...  In this paper we examine those existing solutions and analyze them for their applicability to wireless mesh networks.  ...  Additionally it is open work to create more exact trust requirements for wireless mesh networks, as it is started in appendix A.1.  ... 
doi:10.1007/978-3-642-21040-2_24 fatcat:o24amlzobretplgt6qny6l62hq

Authentication In Multi-Hop Wireless Mesh Networks

Kaleemullah Khan, Muhammmad Akbar
2008 Zenodo  
Wireless Mesh Networks (WMNs) are an emerging technology for last-mile broadband access. In WMNs, similar to ad hoc networks, each user node operates not only as a host but also as a router.  ...  An edifice of the security concerns of these networks is authentication of a new client joining an integrated ad hoc network and such a scenario will require execution of a multihop authentication technique  ...  PROPOSED AUTHENTICATION SCHEME FOR MULTI HOP WIRELESS MESH NETWORKS The proposed authentication scheme is based on using EAP-TTLS (Tunneled Transport Layer Security) [24] over PANA.  ... 
doi:10.5281/zenodo.1331610 fatcat:rf7mmvrhbjbhroc63vb7ier3ee

Design and implementation of MobiSEC: A complete security architecture for wireless mesh networks

Fabio Martignon, Stefano Paris, Antonio Capone
2009 Computer Networks  
MobiSEC extends the IEEE 802.11i standard exploiting the routing capabilities of mesh routers; after connecting to the access network as generic wireless clients, new mesh routers authenticate to a central  ...  In this paper we propose MobiSEC, a complete security architecture that provides both access control for mesh users and routers as well as a key distribution scheme that supports layer-2 encryption to  ...  Acknowledgment This work was partially supported by MIUR in the framework of the PRIN SESAME project.  ... 
doi:10.1016/j.comnet.2009.04.002 fatcat:xyksslpal5hdnavvkcdftqmfoi

DSA-Mesh: a distributed security architecture for wireless mesh networks

Fabio Martignon, Stefano Paris, Antonio Capone
2011 Security and Communication Networks  
DSA-Mesh exploits the routing capabilities of mesh routers: after connecting to the access network as generic wireless clients, new mesh routers authenticate to a key management service (consisting of  ...  In this paper, we propose DSA-Mesh, a fully distributed security architecture that provides access control for mesh routers as well as a key distribution scheme that supports layer-2 encryption to ensure  ...  Acknowledgments This work was partially supported by MIUR in the framework of the PRIN SESAME project.  ... 
doi:10.1002/sec.181 fatcat:mrhuji3ejnbuxobq6quzncclum

Intrusion Tolerant-based Lightweight CA Model for Wireless Mesh Networks

Ping Guo, Jin Wang, JieZhong Zhu, YaPing Cheng, Jeong-Uk Kim
2013 International Journal of Multimedia and Ubiquitous Engineering  
In a Wireless Mesh Network (WMN), we cannot assume the existence of a trusted certificate authority that is used in regular Public-Key Infrastructure (PKI) .  ...  In this paper, we propose a new trust establishment scheme providing an efficient and lightweight public key authentication without the presence of any trusted third party neither in bootstrapping network  ...  Professor Jeong-Uk Kim is the corresponding author.  ... 
doi:10.14257/ijmue.2013.8.6.03 fatcat:eg7nfm76tfgldpzwam2naggf5a

Authentication and authorisation mechanisms in support of secure access to WMN resources

Markus Anwander, Torsten Braun, Almerima Jamakovic, Thomas Staub
2012 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)  
Finally, we observe the difference between the two and explain in detail the process flow of authorized access to network resources in wireless mesh networks.  ...  Over the past several years, a number of design approaches in wireless mesh networks have been introduced to support the deployment of wireless mesh networks (WMNs).  ...  ACKNOWLEDGMENT The A 4 -Mesh project is carried out as part of the program "AAA/SWITCH -e-Infrastructure for e-Science" lead by SWITCH, the Swiss National Research and Education Network, and is supported  ... 
doi:10.1109/wowmom.2012.6263776 dblp:conf/wowmom/AnwanderBJS12 fatcat:3ptiscfeijhpbcdxtn7gyk4bgy

Easy-to-Deploy Wireless Mesh Network System with User Authentication and WLAN Roaming Features

Tomo NIIZUMA, Hideaki GOTO
2017 IEICE transactions on information and systems  
Therefore, the network administrators can deploy 802.1X-based authentication systems over WMNs without additional configurations on-site. 2) Local authentication method makes the system deployable in times  ...  This paper presents a novel WLAN roaming system over Wireless Mesh Networks (WMNs) that is useful for the use cases shown above.  ...  When N2's supplicant requests network access to N1's authenticator, the AP authentication is processed based on 802.1X between N2's supplicant and the RADIUS server.  ... 
doi:10.1587/transinf.2016edp7123 fatcat:cqgtwxay4ncqnmve5tijkc5qxy

Securing VoIP Services in Multi-Hop Wireless Mesh Networks

Yi Xian, Chin-Tser Huang
2007 2007 4th International Symposium on Wireless Communication Systems  
In this work, we focus on the security issues and present a new protocol for securing the voice traffic over the wireless mesh network, including the client authentication, intermediate mesh nodes authentication  ...  Recently, wireless mesh network has been considered as a good solution for VoIP services since it is easy to deploy and provides a larger area coverage.  ...  On the other hand, the client re-authentication should be robust enough to prevent attackers from gaining unauthorized access. The authors in [8] propose a token-based re-authentication method.  ... 
doi:10.1109/iswcs.2007.4392393 fatcat:34oqa2vx3beupnf7uaxzxpsivy

A Brief Review on Security and Privacy Issues in Wireless Mesh Networks

Priyanka Patel, Abhay Kothari
2016 International Journal of Computer Applications  
This paper also provides a brief detail about existing security architectures and technologies based on wireless mesh network. General Terms Wireless Mesh Network, Security, Attacks et. al.  ...  In recent years wireless mesh networking has emerged as a promising technology to tackle the challenges of the next era of broadband services.  ...  - driven routing approach is used in this scheme. 8 Network ARAN [18] i) On-demand routing protocol ii)It uses the policy of online certification authorization. 9 Network SMT [19] i) On-demand routing  ... 
doi:10.5120/ijca2016910230 fatcat:gnazic2635ahdhrilczyvbkgqi

Secure and Privacy-Preserving Authentication Protocols for Wireless Mesh Networks [chapter]

Jaydip Sen
2012 Applied Cryptography and Network Security  
Local authentication based on public key certificates In the localized authentication, a trusted third party (TTP) serves as the trusted certificate authority (CA) that issues certificates.  ...  Authentication Protocols for Wireless Mesh Networks  ...  Secure and Privacy-Preserving Authentication Protocols for Wireless Mesh Networks, Applied Cryptography and Network Security, Dr.  ... 
doi:10.5772/39176 fatcat:lvh54ipvizdo3drqtro2qbhece

A Blockchain-Based Authentication Protocol for WLAN Mesh Security Access

Xin Jiang, Mingzhe Liu, Chen Yang, Yanhua Liu, Ruili Wang
2019 Computers Materials & Continua  
This paper proposes a new block chain-based authentication protocol for WLAN mesh security access, to reduce the deployment costs and resolve the issues of requiring key delivery and central server during  ...  In order to deploy a secure WLAN mesh network, authentication of both users and APs is needed, and a secure authentication mechanism should be employed.  ...  Acknowledgement: The authors declare that there is no conflict of interest regarding the publication of this paper.  ... 
doi:10.32604/cmc.2019.03863 fatcat:4i66u47j2zgengnz4e56bcm5oa
« Previous Showing results 1 — 15 out of 1,418 results