TY - GEN
T1 - An ID-based authentication scheme for the IEEE 802.11s mesh network
AU - Boudguiga, Aymen
AU - Laurent, Maryline
PY - 2010/12/1
Y1 - 2010/12/1
N2 - Nowadays authentication in Wireless Mesh Networks (WMN) refers to the 802.1X authentication methods or a Preshared key authentication, and makes use of certificates or shared secrets. In wireless environments, management of certificates is disadvantageous. Certificates require deploying a Public Key Infrastructure (PKI) and Certification Authorities (CA) and they require defining a certificate management policy to control the generation, transmission and revocation of certificates. Management of certificates is a cumbersome task and does not match the limited (power and memory) resources available at wireless nodes. Moreover it does not match the non permanent connectivity to CA. In this paper, we propose an ID-based method, as an alternative to the PKI, to provide nodes with private and public keys, and we present an authentication scheme that uses the ID-based cryptographic concepts. As illustrated in the paper, the authentication scheme is shown as suitable to the WMN networks.
AB - Nowadays authentication in Wireless Mesh Networks (WMN) refers to the 802.1X authentication methods or a Preshared key authentication, and makes use of certificates or shared secrets. In wireless environments, management of certificates is disadvantageous. Certificates require deploying a Public Key Infrastructure (PKI) and Certification Authorities (CA) and they require defining a certificate management policy to control the generation, transmission and revocation of certificates. Management of certificates is a cumbersome task and does not match the limited (power and memory) resources available at wireless nodes. Moreover it does not match the non permanent connectivity to CA. In this paper, we propose an ID-based method, as an alternative to the PKI, to provide nodes with private and public keys, and we present an authentication scheme that uses the ID-based cryptographic concepts. As illustrated in the paper, the authentication scheme is shown as suitable to the WMN networks.
U2 - 10.1109/WIMOB.2010.5645055
DO - 10.1109/WIMOB.2010.5645055
M3 - Conference contribution
AN - SCOPUS:78650746423
SN - 9781424477425
T3 - 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob'2010
SP - 256
EP - 263
BT - 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob'2010
T2 - 6th Annual IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob'2010
Y2 - 11 October 2010 through 13 October 2010
ER -