Abstract
Authentication delay is the main requirement for handoff in wireless mesh networks when mobile client moves from one domain to another. In order to solve the problems, we propose an algorithm for handoff in Wireless Mesh Networks. Pre-authentication is done by the mobile station itself up to the next access point. A neighbor graph is used for maintaining and dynamically identifying the mobile topology of the network. A proxy signcryption scheme is applied between the Mesh Node (MN) and mobile client (MC) for the period of inter-domain authentication. To make sure security, the authentication messages are encrypted while transmitted between mobile client and mesh nodes and signed in an integrated fashion such that the communicated message is expressed as signcrypted. The simulation’s output shows, that the algorithm strengthens the security of the network.














Similar content being viewed by others
References
Akilarasu G, Shalinie SM (2014) Trust based authentication and key establishment for secure routing in WMN. KSII transactions on internet and information systems 8(12)
Akilarasu G, Shalinie SM (2017) Wormhole-free routing and DoS attack defense in wireless mesh networks. Wireless Netw 23(6):1709–1718. https://doi.org/10.1007/s11276-016-1240-0
Alamri N, Chow CE, Aljaedi A, Elgzil A (2018) UFAP: ultra-fast handoff authentication protocol for wireless mesh networks. In: 2018 Wireless Days (WD) p 1–8 https://doi.org/10.1109/WD.2018.8361684
Ansaroudi ZE, Pashazadeh S (2019) Modeling and formal verification of the ticket-based handoff authentication protocol for wireless mesh networks. In: international symposium on pervasive systems, algorithms and networks, Springer, Cham https://doi.org/10.1007/978-3-030-30143-9_12
Gao T, Peng F, Guo N (2016) Anonymous authentication scheme based on identity-based proxy group signature for wireless mesh network. EURASIP J Wirel Commun Netw 2016(1):1–10. https://doi.org/10.1186/s13638-016-0685-2
Ghosh S, Bhadra S, Bhattacharya I (2011) Group-key management model for worldwide wireless mesh networks. Int J Commun Netw Secur 1(2):7–14
IEEE 802 Committee (2003) Draft Amendment to standard for telecommunications and information exchange between systems-LAN/MAN specific requirements-part 11: wireless medium access control (MAC) and physical layer (PHY) specifications: medium access control (MAC) security enhancements. IEEE Std 802.11 i/D7. 0
IEEE 802.1 Working Group (2001) Standards for local and metropolitan area networks: standrad for port based network access control. IEEE Draft P802. 1X/D11
Lai YM, Cheng PJ, Lee CC, Ku CY (2016) A new ticket-based authentication mechanism for fast handover in mesh network. PLoS ONE 11(5):e0155064. https://doi.org/10.1371/journal.pone.0155064
Mahajan R, Sharma PK (2016) Authentication based secure protocol using TTP for Wmn's. In: 2016 3rd International conference on computing for sustainable global development (INDIACom) p 3286–3290
Malik S, Singh RK (2019) A novel block chain-based approach for secure handoff in WMN with reduced authentication delay. Int J Emerg Technol 10(2):299–306
Quang VT, Le Viet H (2019) Key management techniques for wireless mesh network. In: Wireless mesh networks-security, architectures and protocols. intechopen
Rathee G, Saini H (2016) A fast handoff technique in wireless mesh network (FHT for WMN). Proced Comput Sci 79:722–728. https://doi.org/10.1016/j.procs.2016.03.095
Rathee G, Saini H (2019) Secure handoff technique with reduced authentication delay in wireless mesh network. Int J Adv Intell Paradig 13(1–2):130–154. https://doi.org/10.1504/IJAIP.2019.099948
Sen J (2011) An anonymous authentication and communication protocol for wireless mesh networks. In: International conference on advances in computing and communications. Springer, Berlin, Heidelberg https://doi.org/10.1007/978-3-642-22726-4_60.
Sharma PK, Mahajan R (2017) A Security architecture for attacks detection and authentication in wireless mesh networks. Clust Comput 20(3):2323–2332. https://doi.org/10.1007/s10586-017-0970-9
Sharma PK, Mahajan R, Surender (2020) ID-based signcryption authentication algorithm for intra- and inter-domain handoff in wireless mesh networks. Iran J Sci Technol Trans Electr Eng 44:659–667. https://doi.org/10.1007/s40998-019-00258-8
Sharma PK, Mahajan R, Surender (2021) Trust-based multi-level secure routing for authentication and authorisation in WMN. Int J Adv Intell Paradig 20(3–4):323–342. https://doi.org/10.1504/IJAIP.2021.119021
Wang D, Xu L, Wang F, Xu Q (2018) An anonymous batch handover authentication protocol for big flow wireless mesh networks. EURASIP J Wirel Commun Netw 2018(1):1–8. https://doi.org/10.1186/s13638-018-1217-z
Xiao P, He J, Fu Y (2012) Distributed group key management in wireless mesh networks. Int J Secur Appl 6(2):115–120
Xu L, He Y, Chen X, Huang X (2014) Ticket-based handoff authentication for wireless mesh networks. Comput Netw 73:185–194. https://doi.org/10.1016/j.comnet.2014.08.009
Yang X, Huang X, Han J, Su C (2016) proved handover authentication and key pre-distribution for wireless mesh networks. Concurrency Computation Pract Exper 28(10):2978–2990. https://doi.org/10.1002/cpe.3544
Yang X, Huang X, Han J, Su C (2016a) Improved handover authentication and key pre-distribution for wireless mesh networks. Concurrency Comput Pract Exper 28(10):2978–2990. https://doi.org/10.1002/cpe.3544
Yang X, Zhang Y, Liu JK, Zeng Y (2016b) A trust and privacy preserving handover authentication protocol for wireless networks. In: 2016b IEEE Trustcom/BigDataSE/ISPA p 138–143 https://doi.org/10.1002/cpe.3544
Yi D, Xu G, Minqing Z (2011) The research on certificateless hierarchical key management in wireless mesh network. In: 2011 IEEE 3rd international conference on communication software and networks p 504–507 https://doi.org/10.1109/ICCSN.2011.6013643
Yin H, Ni H, Sun L, Wang M, Zhou X (2013) A caching-list based fast handoff mechanism in wireless mesh networks. In: 2013 International conference on ICT convergence (ICTC) p 402–407 https://doi.org/10.1109/ICTC.2013.6675382
Zhang X, Li G, Han W, Ji H (2015a) A novel ID-based multi-domain handover protocol for mesh points in WMNs. KSII Transactions on Internet and Information Systems (TIIS) 9(7):2512–2529. https://doi.org/10.3837/tiis.2015.07.10
Zhang X, Li G, Han W (2015b) Ticket-based authentication for fast handover in wireless mesh networks. Wireless Pers Commun 85(3):1509–1523. https://doi.org/10.1007/s11277-015-2853-9
Zhu H, Lin X, Lu R, Ho PH, Shen X (2008) SLAB: a secure localized authentication and billing scheme for wireless mesh networks. IEEE Trans Wireless Commun 7(10):3858–3868. https://doi.org/10.1109/T-WC.2008.07418
Funding
The authors did not receive support from any organization for the submitted work.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflicts of interest to report regarding the present study.
Human and animal rights statement
This is an observational study. This research includes No involvement of Humans and Animals, so no ethical approval is required.
Informed consent
The studies are conducted on already available data for which consent is not required.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Singla, S., Sharma, P. & Sharma, P.K. Enhanced security using proxy signcryption technique for wireless mesh networks. Int J Syst Assur Eng Manag 14, 474–482 (2023). https://doi.org/10.1007/s13198-022-01820-0
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13198-022-01820-0