Abstract

As a brand-new network structure, WLAN mesh network has high capacity, high speed and wide coverage.But security issues have become a main hindrance to enlarge WLAN mesh network business. This paper provides a new Blockchain-Based Authentication Protocol for WLAN Mesh Security Access Scheme, to resolve the issues of requiring key delivery and central server during IEEE 802.11i and IEEE 802.11s authentication. This method takes the user’s authentication request as a transaction, considers all the authentication records in the mesh network as the public ledger and realizes the effective monitoring of the malicious attack. Lastly this paper analyzes the security of the Protocol in detail,and proves this method can solve the dependence of the authentication node on PKI and CA.

Highlights

  • WLAN mesh network is a kind of multi-hop, self-organizing and self-healing broadband wireless distributed network structure

  • The emergence of WLAN mesh network and its unique network structure features can solve the constant ubiquity of high-speed internet access

  • As the WLAN mesh network extends the range of traditional wireless networks, it is known as the Wireless Broadband Future [Yu and Wong (2015)] and the economic broadband world’s driving [Hung and Bensaou (2014)]

Read more

Summary

Introduction

WLAN mesh network is a kind of multi-hop, self-organizing and self-healing broadband wireless distributed network structure. With the increasing demand for data confidentiality and privacy protection in modern society, the WLAN mesh network security has become a major obstacle to large-scale commercial Mesh. To address such security issues, Abujoda et al [Abujoda, Dietrich, Papadimitriou et al (2015)] implement and deploy a software-defined WMN (SDWMN) control plane in one of the confined community networks, in order to coordinate WMN transmission redirection. A mobile management scheme based on enhanced forward pointer is implemented to handle Internet and Internal network traffic in wireless mesh networks. This paper implemented the proposed method on five nodes, and the experimental results confirmed that block chain-based authentication can decrease the authentication delay in multi-hop environment that makes the packet loss rate larger. Note that mining data from multiple data sources to extract useful information [Wang, Ji, Liu et al (2018)] for better understanding of security risk evaluation should be considered in the future study, and it is important to analyze the behaviors of target application [Jiang, Liu, Yang et al (2018)] running on mesh nodes

Overview of mesh network
Identity cryptosystem
Certification process
System implementation
Block structure
Implementation
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call