Abstract
Access security is the key obstacle of the rapid popularization of wireless mesh network (WMN). We suggest the proxy group signature scheme based on identity in this paper. This scheme is combined with proxy group signature and identity-based group signature, based on designated hierarchical proxy architecture for WMN. An anonymous mutual authentication scheme is thus achieved, which not only simplifies the complex management of PKI but also guarantees anonymous authentication and owns high handover authentication efficiency. Performance and security analysis show that the scheme in this paper is efficient and resilient to a series of security and anonymity attacks.
Highlights
Compared with traditional wireless self-organized network (MANET), wireless mesh network (WMN) owns higher reliability, larger data throughput, and lower disturbance, as well as stronger scalability due to its unique mesh structure
We proposed a new scheme, which is the combination of proxy group signature and identity-based group signature, based on designated hierarchical proxy architecture for WMN
6 Conclusions Our scheme is different from other similar works because we combined the proxy group signature and identitybased group signature
Summary
Compared with traditional wireless self-organized network (MANET), wireless mesh network (WMN) owns higher reliability, larger data throughput, and lower disturbance, as well as stronger scalability due to its unique mesh structure. WMN is able to provide highspeed wireless access service for mobile users in a wide area. To protect user’s privacy is important during mutual authentication in the research of WMN access security [2]. For the past few decades, scholars have lots of researches in WMN access security, which aim at achieving safe and efficient access authentication systems. In. Ref [4], the authors applied identity-based encryption and signature scheme to WMN access authentication. Ref [5]’s authors utilized Tor (The Onion Router Protocol) to protect the security of WMN router and the privacy of MC. The authors of Ref [6] adopted Ring Signature for WMN anonymous authentication and communication.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have