2008 IEEE International Conference on Communications 2008
DOI: 10.1109/icc.2008.326
|View full text |Cite
|
Sign up to set email alerts
|

Mutual Authentication in Wireless Mesh Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(5 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…Fu et al [38,44] presented a mutual authentication scheme on the basis of a combination of techniques, such as zone-based hierarchical topology structure, virtual Certification Authority (CA), offline CA, identity-based cryptosystem, and multi-signature. By applying these techniques, the proposed scheme succeeds in improving key management in security, expandability, validity, fault tolerance, and usability.…”
Section: Intrusion Prevention Mechanismsmentioning
confidence: 99%
“…Fu et al [38,44] presented a mutual authentication scheme on the basis of a combination of techniques, such as zone-based hierarchical topology structure, virtual Certification Authority (CA), offline CA, identity-based cryptosystem, and multi-signature. By applying these techniques, the proposed scheme succeeds in improving key management in security, expandability, validity, fault tolerance, and usability.…”
Section: Intrusion Prevention Mechanismsmentioning
confidence: 99%
“…The authors of Reference 23 define a new authentication technique for hierarchical WMNs based on threshold cryptography, where the certification authority services are provided through the collaboration of a pre‐determined set of mesh routers. The proposed architecture extends the Diffie–Hellman key exchange protocol for negotiating a key that authorizes a user to access the backbone network services provided by a mesh router situated in a different zone.…”
Section: Related Workmentioning
confidence: 99%
“…BR ij, for all i=1(1)p and j=1(1)n i, which serve as private key generation (PKG) nodes within the region/strata/group. But [6] described this BR ij as "higher performance" routers which have almost no significance to construct the PKG. These n i backbone routers would then form a virtual CA of the ith region and manage the keys using the (x i , n i )-threshold cryptographic method [8].…”
Section: System Initialization and Necessary Computationmentioning
confidence: 99%