Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Communications of the ACM
Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
Shared Generation of Authenticators and Signatures (Extended Abstract)
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Online/Offline signatures and multisignatures for AODV and DSR routing security
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
Securing wireless mesh networks
IEEE Wireless Communications
ARSA: An Attack-Resilient Security Architecture for Multihop Wireless Mesh Networks
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
In this paper, a novel compromise-resilient localized authentication scheme is proposed for metropolitan-area wireless mesh networks (WMNs), which aims to mitigate the impact caused by a compromise event on one or multiple mesh access points (MAPs) before they are identified and removed from the network. As a proactive mechanism based on a "best practice" strategy - Defence in Depth, the proposed scheme can protect critical WMN functionalities, such as user authentication and handoff support, even in presence of compromised MAPs.