Skip to main content
Log in

How to secure multi-domain wireless mesh networks

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Due to the ease of deployment and low cost, wireless mesh networks have been deployed in many metropolitan areas and business units. How to establish secure communications among the communication entities such as mesh routers and mobile clients (or mesh clients) even when roaming to different mesh networks (called mesh domains) is a challenging task. In this paper, we leverage the ID-based cryptography and propose a novel secure architecture to enable secure communications in large-scale multi-domain wireless mesh networks. Under this architecture, mesh clients can conveniently gain services securely even when roaming.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

Notes

  1. It is computationally infeasible to extract the integer \(x\in {\mathbb{Z}}_{q}^{\ast}=\{i|1\leq i\leq q-1\}\), given \(P,Q\in {\mathbb{G}}_1\) (respectively, \(P,Q\in {\mathbb{G}}_2\)) such that QxP (respectively, Q = P x).

References

  1. The WiMAX Forum. http://www.wimaxforum.org

  2. Akyildiz, I., Wang, X., & Wang, W. (2005). Wireless mesh networks: A survey. Computer Networks, 47, 445–487.

    Article  MATH  Google Scholar 

  3. Tropos Networks. http://www.tropos.com/technology/whitepaper.shtml

  4. Aguayo, D., Bicket, J., Biswas, S., Judd, G., & Morris, R. (2004). Link-level measurements from an 802.11b mesh network. In ACM SIGCOMM’04, Portland, OR, Aug. 2004.

  5. Chandra, R., Qiu, L., Jain, K., & Mahdian, M. (2004). Optimizing the placement of Internet taps in wireless neighborhood networks. In IEEE ICNP’04, Berlin, Germany, Oct. 2004.

  6. Draves, R., Padhye, J., & Zill, B. (2004). Routing in multi-radio, multi-hop wireless mesh networks. In ACM MOBICOM’04, Philadelphia, PA, Sep./Oct. 2004.

  7. Zhang, Y., & Fang, Y. (2006). ARSA: An attack-resilient security architecture for multi-hop wireless mesh networks. IEEE Journal on Selected Areas in Communications, 24(10), 1916–1928

    Article  MathSciNet  Google Scholar 

  8. European Telecommunications Standards Institute (ETSI). (1993). GSM 2.09: Security aspects, June 1993.

  9. Lin, H., & Harn, L. (1995). Authentication protocols for personal communication systems. In ACM SIGCOMM’95, Cambridge, MA, Aug./Sept. 1995.

  10. 3GPP TS 21.102, 3rd Generation Partnership Project (3GPP); Technical Specification Group (TSG) SA; 3G Security; Security Architecture, version 4.2.0, Release 4, 2001.

  11. Lin, Y., & Chen, Y. (2003). Reducing authentication signalling traffic in third-generation mobile network. IEEE Transactions on Wireless Communications, 2(3), 493–501.

    Article  Google Scholar 

  12. Perkins C. (2002). IP mobility support for IPv4, RFC 3344, Aug. 2002.

  13. Zhang, Y., & Fang, Y. (2007). A secure authentication and billing architecture for wireless mesh networks. ACM Wireless Networks 13(5), 569–582.

    Article  Google Scholar 

  14. Zhu, H., Lin, X., Lu, R., Ho, P.-H., & Shen, X. (2008). Slab: Secure localized authentication and billing scheme for wireless mesh networks. IEEE Transactions on Wireless Communications, 7(10), 3858–3868.

    Article  Google Scholar 

  15. Ren, K., & Lou, W. (2008). A sophisticated privacy-enhanced yet accountable security framework for wireless mesh networks. In Proceedings of IEEE ICDCS, Beijing, China, June 2008.

  16. Shamir, A. (1984). Identity based cryptosystems and signature schemes. In Proceedings of CRYPTO’84. Series LNCS (Vol. 196, pp. 47–53). Berlin/Heidelberg: Springer-Verlag.

  17. Boneh, D., & Franklin, M. (2001). Identify-based encryption from the weil pairing. In Proceedings of CRYPTO’01. Series LNCS (Vol. 2139, pp. 213–229). Berlin/Heidelberg: Springer-Verlag.

  18. Barreto, P., Kim, H., Bynn, B., & Scott, M. (2002). Efficient algorithms for pairing-based cryptosystems. In Proceedings of CRYPTO’02. Series LNCS (Vol. 2442, pp. 354–368). Berlin/Heidelberg: Springer-Verlag.

  19. Mao, W. (2004). An identity-based non-interactive authentication framework for computational grids. Hewlett-Packard Laboratories, Technical Report HPL-2004-96, June 2004.

  20. Kerins, T., Marnane, W., Popovici, E., & Barreto, P. (2005). Efficient hardware for the tate pairing calculation in characteristic three. In Proceedings of workshop on Cryptographic Hardware and Embedded Systems (CHES’05), Edinburgh, Scotland, Aug./Sep. 2005.

  21. Kerins, T., Marnane, W., Popovici, E., & Barreto, P. (2005). A hardware accelerator for pairing based cryptosystems. In IEE proceedings of information security, Vol.152, No. 1, pp. 47–56.

  22. Barreto, P., Lynn, B., & Scott, M. (2004). On the selection of pairing-friendly groups. In Selected Areas in Cryptography—SAC’2003. Series LNCS (Vol. 3006, pp. 17–25). Berlin/Heidelberg: Springer-Verlag.

  23. Szczechowiak, P., Kargl, A., Scott, M., & Collier, M. (2009). On the application of pairing based cryptography to wireless sensor networks. In ACM Wireless Network Security (WiSec), Zurich, Switzerland, March 2009.

  24. Dutta, R., Barua, R., & Sarkar, P. (2004). Pairing-based cryptography: A survey. Cryptology ePrint Archive Report 2004/064.

  25. Sakai, R., Ohgishi, K., & Kasahara, M. (2000). Cryptosystems based on pairing. In Proceedings of 2000 Symposium on Cryptography and Information Security (SCIS2000), Okinawa, Japan, Jan. 2000.

Download references

Acknowledgements

This work was partially supported by the U.S. National Science Foundation under grant CNS-0626881 and 111 Project in China under Grant B08038. The work of Zhu was also partially supported by the National Science Foundation of China under grant 60772136 and the China 863 Project under grant 2007AA01Z435.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaoyan Zhu.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zhu, X., Fang, Y. & Wang, Y. How to secure multi-domain wireless mesh networks. Wireless Netw 16, 1215–1222 (2010). https://doi.org/10.1007/s11276-009-0198-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-009-0198-6

Keywords

Navigation