Abstract

Access security is the key obstacle of the rapid popularization of wireless mesh network (WMN). We suggest the proxy group signature scheme based on identity in this paper. This scheme is combined with proxy group signature and identity-based group signature, based on designated hierarchical proxy architecture for WMN. An anonymous mutual authentication scheme is thus achieved, which not only simplifies the complex management of PKI but also guarantees anonymous authentication and owns high handover authentication efficiency. Performance and security analysis show that the scheme in this paper is efficient and resilient to a series of security and anonymity attacks.

Highlights

  • Compared with traditional wireless self-organized network (MANET), wireless mesh network (WMN) owns higher reliability, larger data throughput, and lower disturbance, as well as stronger scalability due to its unique mesh structure

  • We proposed a new scheme, which is the combination of proxy group signature and identity-based group signature, based on designated hierarchical proxy architecture for WMN

  • 6 Conclusions Our scheme is different from other similar works because we combined the proxy group signature and identitybased group signature

Read more

Summary

Introduction

Compared with traditional wireless self-organized network (MANET), wireless mesh network (WMN) owns higher reliability, larger data throughput, and lower disturbance, as well as stronger scalability due to its unique mesh structure. WMN is able to provide highspeed wireless access service for mobile users in a wide area. To protect user’s privacy is important during mutual authentication in the research of WMN access security [2]. For the past few decades, scholars have lots of researches in WMN access security, which aim at achieving safe and efficient access authentication systems. In. Ref [4], the authors applied identity-based encryption and signature scheme to WMN access authentication. Ref [5]’s authors utilized Tor (The Onion Router Protocol) to protect the security of WMN router and the privacy of MC. The authors of Ref [6] adopted Ring Signature for WMN anonymous authentication and communication.

Preliminaries
Hard problems and security assumptions
Anonymous access authentication scheme
Handover authentication protocol
Discussion
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call