Abstract
Due to the ease of deployment and low cost, wireless mesh networks have been deployed in many metropolitan areas and business units. How to establish secure communications among the communication entities such as mesh routers and mobile clients (or mesh clients) even when roaming to different mesh networks (called mesh domains) is a challenging task. In this paper, we leverage the ID-based cryptography and propose a novel secure architecture to enable secure communications in large-scale multi-domain wireless mesh networks. Under this architecture, mesh clients can conveniently gain services securely even when roaming.

Similar content being viewed by others
Notes
It is computationally infeasible to extract the integer \(x\in {\mathbb{Z}}_{q}^{\ast}=\{i|1\leq i\leq q-1\}\), given \(P,Q\in {\mathbb{G}}_1\) (respectively, \(P,Q\in {\mathbb{G}}_2\)) such that Q = xP (respectively, Q = P x).
References
The WiMAX Forum. http://www.wimaxforum.org
Akyildiz, I., Wang, X., & Wang, W. (2005). Wireless mesh networks: A survey. Computer Networks, 47, 445–487.
Tropos Networks. http://www.tropos.com/technology/whitepaper.shtml
Aguayo, D., Bicket, J., Biswas, S., Judd, G., & Morris, R. (2004). Link-level measurements from an 802.11b mesh network. In ACM SIGCOMM’04, Portland, OR, Aug. 2004.
Chandra, R., Qiu, L., Jain, K., & Mahdian, M. (2004). Optimizing the placement of Internet taps in wireless neighborhood networks. In IEEE ICNP’04, Berlin, Germany, Oct. 2004.
Draves, R., Padhye, J., & Zill, B. (2004). Routing in multi-radio, multi-hop wireless mesh networks. In ACM MOBICOM’04, Philadelphia, PA, Sep./Oct. 2004.
Zhang, Y., & Fang, Y. (2006). ARSA: An attack-resilient security architecture for multi-hop wireless mesh networks. IEEE Journal on Selected Areas in Communications, 24(10), 1916–1928
European Telecommunications Standards Institute (ETSI). (1993). GSM 2.09: Security aspects, June 1993.
Lin, H., & Harn, L. (1995). Authentication protocols for personal communication systems. In ACM SIGCOMM’95, Cambridge, MA, Aug./Sept. 1995.
3GPP TS 21.102, 3rd Generation Partnership Project (3GPP); Technical Specification Group (TSG) SA; 3G Security; Security Architecture, version 4.2.0, Release 4, 2001.
Lin, Y., & Chen, Y. (2003). Reducing authentication signalling traffic in third-generation mobile network. IEEE Transactions on Wireless Communications, 2(3), 493–501.
Perkins C. (2002). IP mobility support for IPv4, RFC 3344, Aug. 2002.
Zhang, Y., & Fang, Y. (2007). A secure authentication and billing architecture for wireless mesh networks. ACM Wireless Networks 13(5), 569–582.
Zhu, H., Lin, X., Lu, R., Ho, P.-H., & Shen, X. (2008). Slab: Secure localized authentication and billing scheme for wireless mesh networks. IEEE Transactions on Wireless Communications, 7(10), 3858–3868.
Ren, K., & Lou, W. (2008). A sophisticated privacy-enhanced yet accountable security framework for wireless mesh networks. In Proceedings of IEEE ICDCS, Beijing, China, June 2008.
Shamir, A. (1984). Identity based cryptosystems and signature schemes. In Proceedings of CRYPTO’84. Series LNCS (Vol. 196, pp. 47–53). Berlin/Heidelberg: Springer-Verlag.
Boneh, D., & Franklin, M. (2001). Identify-based encryption from the weil pairing. In Proceedings of CRYPTO’01. Series LNCS (Vol. 2139, pp. 213–229). Berlin/Heidelberg: Springer-Verlag.
Barreto, P., Kim, H., Bynn, B., & Scott, M. (2002). Efficient algorithms for pairing-based cryptosystems. In Proceedings of CRYPTO’02. Series LNCS (Vol. 2442, pp. 354–368). Berlin/Heidelberg: Springer-Verlag.
Mao, W. (2004). An identity-based non-interactive authentication framework for computational grids. Hewlett-Packard Laboratories, Technical Report HPL-2004-96, June 2004.
Kerins, T., Marnane, W., Popovici, E., & Barreto, P. (2005). Efficient hardware for the tate pairing calculation in characteristic three. In Proceedings of workshop on Cryptographic Hardware and Embedded Systems (CHES’05), Edinburgh, Scotland, Aug./Sep. 2005.
Kerins, T., Marnane, W., Popovici, E., & Barreto, P. (2005). A hardware accelerator for pairing based cryptosystems. In IEE proceedings of information security, Vol.152, No. 1, pp. 47–56.
Barreto, P., Lynn, B., & Scott, M. (2004). On the selection of pairing-friendly groups. In Selected Areas in Cryptography—SAC’2003. Series LNCS (Vol. 3006, pp. 17–25). Berlin/Heidelberg: Springer-Verlag.
Szczechowiak, P., Kargl, A., Scott, M., & Collier, M. (2009). On the application of pairing based cryptography to wireless sensor networks. In ACM Wireless Network Security (WiSec), Zurich, Switzerland, March 2009.
Dutta, R., Barua, R., & Sarkar, P. (2004). Pairing-based cryptography: A survey. Cryptology ePrint Archive Report 2004/064.
Sakai, R., Ohgishi, K., & Kasahara, M. (2000). Cryptosystems based on pairing. In Proceedings of 2000 Symposium on Cryptography and Information Security (SCIS2000), Okinawa, Japan, Jan. 2000.
Acknowledgements
This work was partially supported by the U.S. National Science Foundation under grant CNS-0626881 and 111 Project in China under Grant B08038. The work of Zhu was also partially supported by the National Science Foundation of China under grant 60772136 and the China 863 Project under grant 2007AA01Z435.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Zhu, X., Fang, Y. & Wang, Y. How to secure multi-domain wireless mesh networks. Wireless Netw 16, 1215–1222 (2010). https://doi.org/10.1007/s11276-009-0198-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-009-0198-6