2008
DOI: 10.1504/ijsn.2008.017225
|View full text |Cite
|
Sign up to set email alerts
|

A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks

Abstract: Abstract:In the paper, we propose an efficient two-factor localised authentication scheme for inter-domain handover and roaming in IEEE 802.11 based service-oriented wireless mesh networks (WMNs). Some important aspects, such as resource-constraint Mobile Stations (MSs) and the ping-pong movement phenomenon when handover roaming across different hotspots occurs, are considered. An analytic model is developed to investigate the efficiency of the proposed scheme. Numerical results are given to demonstrate the su… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
16
0

Year Published

2009
2009
2016
2016

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 32 publications
(16 citation statements)
references
References 19 publications
0
16
0
Order By: Relevance
“…Lin et al have proposed a two-factor localized authentication scheme for inter-domain handover and mobility management in IEEE 802.11 standard compliant WMNs [32] .It utilizes the asymmetric property of Rabin cryptosystem in mobility management issues where APs have high computational power and the MSs are resource-constrained. For providing enhanced security, it uses two-factor authentication for roaming mobile users.…”
Section: Related Workmentioning
confidence: 99%
“…Lin et al have proposed a two-factor localized authentication scheme for inter-domain handover and mobility management in IEEE 802.11 standard compliant WMNs [32] .It utilizes the asymmetric property of Rabin cryptosystem in mobility management issues where APs have high computational power and the MSs are resource-constrained. For providing enhanced security, it uses two-factor authentication for roaming mobile users.…”
Section: Related Workmentioning
confidence: 99%
“…Wan et al [25] proposed two privacy-preserving routing schemes to give anonymity, unlinkability, and security for WMNs. The authors of [26], [27] presented an authentication scheme for WMNs, which is resilient against mesh router compromise. Other general privacy-aware authentication methods are described in [28], [29], [30].…”
Section: Related Workmentioning
confidence: 99%
“…They have ignored how to deal with identity privacy and not mentioned how authentication are performed between mesh nodes. The authors of [10], [11] presented an authentication scheme for WMNs, which is resilient against mesh router compromise. Other general privacy-aware authentication techniques are described in [12], [13], [14].…”
Section: Related Workmentioning
confidence: 99%