LEAS: Localized efficient authentication scheme for multi-operator wireless mesh network with identity-based proxy signature
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Gao, Tianhan | - |
dc.contributor.author | Guo, Nan | - |
dc.contributor.author | Yim, Kangbin | - |
dc.date.accessioned | 2021-08-12T00:47:12Z | - |
dc.date.available | 2021-08-12T00:47:12Z | - |
dc.date.issued | 2013-09 | - |
dc.identifier.issn | 0895-7177 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/13434 | - |
dc.description.abstract | Aiming at establishing secure access and communications for a multi-operator wireless mesh network (WMN), this paper proposes a localized efficient authentication scheme (LEAS) under a broker-based hierarchical security architecture and trust model. Mutual authentication is achieved directly between mesh client and access mesh router through a ticket which is equipped with an identity-based proxy signature. Fast authentication for different roaming scenarios is supported by using HMAC operations on both the mesh client side and mesh router side. As a byproduct, key agreement among network entities is also implemented to protect the subsequent communications after authentication. Our performance and security analysis demonstrate that LEAS is efficient and resilient to various kinds of attacks. (c) 2012 Elsevier Ltd. All rights reserved. | - |
dc.format.extent | 14 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | Pergamon Press Ltd. | - |
dc.title | LEAS: Localized efficient authentication scheme for multi-operator wireless mesh network with identity-based proxy signature | - |
dc.type | Article | - |
dc.publisher.location | 영국 | - |
dc.identifier.doi | 10.1016/j.mcm.2012.11.030 | - |
dc.identifier.scopusid | 2-s2.0-84880643249 | - |
dc.identifier.wosid | 000321700400047 | - |
dc.identifier.bibliographicCitation | Mathematical and Computer Modelling, v.58, no.5-6, pp 1427 - 1440 | - |
dc.citation.title | Mathematical and Computer Modelling | - |
dc.citation.volume | 58 | - |
dc.citation.number | 5-6 | - |
dc.citation.startPage | 1427 | - |
dc.citation.endPage | 1440 | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Mathematics | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Interdisciplinary Applications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.relation.journalWebOfScienceCategory | Mathematics, Applied | - |
dc.subject.keywordPlus | ARCHITECTURE | - |
dc.subject.keywordPlus | ENCRYPTION | - |
dc.subject.keywordAuthor | Wireless mesh network | - |
dc.subject.keywordAuthor | Multi-operator | - |
dc.subject.keywordAuthor | Mutual authentication | - |
dc.subject.keywordAuthor | Identity-based proxy signature | - |
dc.subject.keywordAuthor | Ticket | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(31538) 22, Soonchunhyang-ro, Asan-si, Chungcheongnam-do, Republic of Korea+82-41-530-1114
COPYRIGHT 2021 by SOONCHUNHYANG UNIVERSITY ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.