A Variable Threshold-Value Authentication Architecture for Wireless Mesh Networks
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Guo, Ping | - |
dc.contributor.author | Wang, Jin | - |
dc.contributor.author | Geng, Xue Hua | - |
dc.contributor.author | Kim, Chang Seob | - |
dc.contributor.author | Kim, Jeong-Uk | - |
dc.date.available | 2020-02-28T15:45:38Z | - |
dc.date.created | 2020-02-06 | - |
dc.date.issued | 2014-11 | - |
dc.identifier.issn | 1607-9264 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/12169 | - |
dc.description.abstract | Wireless Mesh Networks (WMNs) play a very important role on "the last mile" in a variety of wireless network access with infrastructure support. It is necessary to provide guaranteed security while minimizing WMNs topology change by considering both rapid authentication of mobile terminals and demand for fast switch between different wireless networks. In this paper, we propose a novel design paradigm toward lightweight and tolerant authentication for service-oriented WMNs, named Variable Threshold-value Authentication (VTA) architecture. On one hand, VTA's intrusion-tolerant ability is ensured to design a series of node activated mechanisms to remain threshold values t and n of system private key unchanged. On the other hand, VTA changes threshold values t and n when nodes leave/join authentication server group. Analysis and simulation results show that VTA can not only overcome the disadvantage of those static threshold value schemes, but also largely increase system cost comparing to the schemes not equipped with threshold mechanism for WMNs. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | NATL ILAN UNIV, JIT | - |
dc.relation.isPartOf | JOURNAL OF INTERNET TECHNOLOGY | - |
dc.subject | SECRET | - |
dc.title | A Variable Threshold-Value Authentication Architecture for Wireless Mesh Networks | - |
dc.type | Article | - |
dc.type.rims | ART | - |
dc.description.journalClass | 1 | - |
dc.identifier.wosid | 000345885500005 | - |
dc.identifier.doi | 10.6138/JIT.2014.15.6.05 | - |
dc.identifier.bibliographicCitation | JOURNAL OF INTERNET TECHNOLOGY, v.15, no.6, pp.929 - 935 | - |
dc.identifier.scopusid | 2-s2.0-84916883747 | - |
dc.citation.endPage | 935 | - |
dc.citation.startPage | 929 | - |
dc.citation.title | JOURNAL OF INTERNET TECHNOLOGY | - |
dc.citation.volume | 15 | - |
dc.citation.number | 6 | - |
dc.contributor.affiliatedAuthor | Kim, Chang Seob | - |
dc.type.docType | Article | - |
dc.subject.keywordAuthor | Wireless mesh networks | - |
dc.subject.keywordAuthor | Lightweight certification | - |
dc.subject.keywordAuthor | Threshold signature | - |
dc.subject.keywordAuthor | Authentication | - |
dc.subject.keywordPlus | SECRET | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
1342, Seongnam-daero, Sujeong-gu, Seongnam-si, Gyeonggi-do, Republic of Korea(13120)031-750-5114
COPYRIGHT 2020 Gachon University All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.