Skip to main content
Log in

Probabilistic Verification Scenarios with Reduced Authentication Delay for Handoff Clients in Mesh Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In this paper, we have proposed a secure handoff procedure by generating and assessing the tickets for each mesh client which are divided among various zones of mesh routers depending on their transmission range. Further, a trusted third party authentication server is proposed that is responsible for generating and assigning the tickets of each mesh client which are stored distributively at mesh routers. However, during the mobility whenever the range of current serving mesh router decreases, the mesh client needs to connect to a foreign mesh router by authenticating itself in order to continue its network services. The foreign mesh router validates the authenticity of its handoff mesh client by verifying its ticket. The proposed mechanism reduces the potential issue of storage overhead and security threats at mesh clients as all the tickets are stored distributively in the database of each mesh router. The proposed technique is validated with a commercial simulator NS2 over certain network parameters and different probabilistic scenarios of authentication.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Zhu, L., Yu, F. R., Tang, T., & Ning, B. (2017). Handoff performance improvements in an integrated train-ground communication system based on wireless network virtualization. IEEE Transactions on Intelligent Transportation Systems, 18(5), 1165–1178.

    Article  Google Scholar 

  2. Zhou, Z., Zhang, H., & Sun, Z. (2017). An improved privacy-aware handoff authentication protocol for VANETs. Wireless Personal Communications, 97(3), 3601–3618.

    Article  Google Scholar 

  3. Khan, S., & Pathan, A. S. K. (2013). Wireless networks and security issues, challenges and research trends. London: Springer.

    Book  Google Scholar 

  4. Dykema, K. A., Bouws, B. K., Doman, T. J., Leete, III, L. F. Schenck, W. C., & Guthrie, W. E. (2013). Wireless mesh network. U.S. Patent 8,274,928.

  5. Wang, Z., Luo, Z. X., Zhang, J. L., & Saucan, E. (2016). ARAP++: An extension of the local/global approach to mesh parameterization. Frontiers of Information Technology and Electronic Engineering, 17(6), 501–515.

    Article  Google Scholar 

  6. Srivatsa, A. M., & Xie, J. (19 May 2008). A performance study of mobile handoff delay in IEEE 802.11-based wireless mesh networks. In Proceedings of 1st international conference on communications (pp. 2485–2489). Beijing: IEEE.

  7. Khabiri, M., & Ghaffari, A. (2018). Energy-aware clustering-based routing in wireless sensor networks using cuckoo optimization algorithm. Wireless Personal Communications, 98(3), 2473–2495.

    Article  Google Scholar 

  8. Babu, M. R., & Usha, G. (2016). A novel honey pot based detection and isolation approach (NHBADI) to detect and isolate black hole attacks in MANET. Wireless Personal Communications, 90(2), 831–845.

    Article  Google Scholar 

  9. Poongodi, T., & Karthikeyan, M. (2016). Localized secure routing architecture against cooperative black hole attack in mobile ad hoc networks. Wireless Personal Communications, 90(2), 1039–1050.

    Article  Google Scholar 

  10. Purohit, K. C., Dimri, S. C., & Jasola, S. (2017). Mitigation and performance analysis of routing protocols under black-hole attack in vehicular ad hoc network (VANET). Wireless Personal Communications, 97(4), 5099–5114.

    Article  Google Scholar 

  11. Anita, X., Bhagyaveni, M. A., & Manickam, J. M. L. (2015). Collaborative lightweight trust management scheme for wireless sensor networks. Wireless Personal Communications, 80(1), 117–140.

    Article  Google Scholar 

  12. Labraoui, N., Gueroui, M., & Sekhri, L. (2016). A risk-aware reputation-based trust management in wireless sensor networks. Wireless Personal Communications, 87(3), 1037–1055.

    Article  Google Scholar 

  13. Rathee, G., Saini, H., & Singh, G. (2018). Aspects of trusted routing communication in smart networks. Wireless Personal Communications, 98(2), 2367–2387.

    Article  Google Scholar 

  14. Luo, M., & Wan, Y. (2018). An enhanced certificate less signcryption in the standard model. Wireless Personal Communications, 98(3), 2693–2709.

    Article  Google Scholar 

  15. Bala, S., Sharma, G., & Verma, A. K. (2016). PF-ID-2PAKA: Pairing free identity-based two-party authenticated key agreement protocol for wireless sensor networks. Wireless Personal Communications, 87(3), 995–1012.

    Article  Google Scholar 

  16. Cato, N. (2016). On next generation network security. IEEE Network, 31(2), 1–2.

    MathSciNet  Google Scholar 

  17. Mansfield-Devine, S. (2017). File-less attacks: Compromising targets without malware. Network Security, 17(4), 7–11.

    Google Scholar 

  18. Xie, J., Hu, Y. P., Gao, J. T., & Gao, W. (2016). Efficient identity-based signature over NTRU lattice. Frontiers of Information Technology and Electronic Engineering, 17(2), 135–142.

    Article  Google Scholar 

  19. Jiang, Q., Ma, J., Lu, X., & Tian, Y. (2015). An efficient two-factor user authentication scheme with unlink ability for wireless sensor networks. Journal of Peer-to-Peer Networking and Applications, 8(6), 1070–1081.

    Article  Google Scholar 

  20. Shrivastava, G., Sharma, K., & Rai, S. (2010). The detection and defense of DoS and DDos attack: A technical overview. Proceedings of ICC, 27, 274–282.

    Google Scholar 

  21. Abbas, F., & Oh, H. (2014). A step towards user privacy while using location-based services. Journal of Information Processing Signals, 10(4), 618–627.

    Google Scholar 

  22. Zhang, H., Cheng, P., Shi, L., & Chen, J. (2016). Optimal DoS attack scheduling in wireless networked control system. IEEE Transactions on Control Systems Technology, 24(3), 843–852.

    Article  Google Scholar 

  23. Tseng, Y. M. (2009). USIM-based EAP-TLS authentication protocol for wireless local area networks. Computer Standards & Interfaces, 31(1), 128–136.

    Article  Google Scholar 

  24. Jayaraman, P., Lopez, R., Ohba, Y., Parthasarathy, M., & Yegin, A. (2008). Protocol for carrying authentication for network access (PANA). Framework no. RFC 5193.

  25. Park, C., Hur, J., Kim, C., Shin, Y. J., & Yoon, H. (2006). Pre-authentication for fast handoff in wireless mesh networks with mobile APs. In Proceedings of international workshop on information security applications (pp. 349–363). Berlin: Springer.

  26. Huang, C. M., & Li, J. W. (2009). A cluster-chain-based context transfer mechanism for fast basic service set transition in the centralized wireless LAN architecture. Wireless Communications and Mobile Computing, 9(10), 1387–1401.

    Article  Google Scholar 

  27. Ruj, S., Nayak, A., & Stojmenovic, I. (2013). Pairwise and triple key distribution in wireless sensor networks with applications. IEEE Transactions on Computers, 62(11), 2224–2237.

    Article  MathSciNet  MATH  Google Scholar 

  28. Dalal, R., Singh, Y., & Khari, M. (2012). A review on key management schemes in MANET. International Journal of Distributed and Parallel Systems, 3(4), 165–172.

    Article  Google Scholar 

  29. Fu, A., Zhang, Y., Zhu, Z., & Liu, X. (2010). A fast handover authentication mechanism based on ticket for IEEE 802.16m. IEEE Communications Letters, 14(12), 1134–1136.

    Article  Google Scholar 

  30. Fu, A., Zhang, Y., Zhu, Z., Jing, Q., & Feng, J. (2012). An efficient handover authentication scheme with privacy preservation for IEEE 802.16m network. Computers and Security, 31(6), 741–749.

    Article  Google Scholar 

  31. Xu, L., He, Y., Chen, X., & Huang, X. (2014). Ticket-based handoff authentication for wireless mesh networks. Computer Networks, 73, 185–194.

    Article  Google Scholar 

  32. Li, J., Chen, X., Li, M., Li, J., Lee, P. P., & Lou, W. (2014). Secure de-duplication with efficient and reliable convergent key management. IEEE Transactions on Parallel and Distributed Systems, 25(6), 1615–1625.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Geetanjali Rathee.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rathee, G., Jaglan, N., Saini, H. et al. Probabilistic Verification Scenarios with Reduced Authentication Delay for Handoff Clients in Mesh Networks. Wireless Pers Commun 104, 1553–1571 (2019). https://doi.org/10.1007/s11277-018-6098-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-018-6098-2

Keywords

Navigation