Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Authentication protocols for personal communication systems
SIGCOMM '95 Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Efficient Algorithms for Pairing-Based Cryptosystems
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Link-level measurements from an 802.11b mesh network
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
Routing in multi-radio, multi-hop wireless mesh networks
Proceedings of the 10th annual international conference on Mobile computing and networking
Optimizing the Placement of Internet TAPs in Wireless Neighborhood Networks
ICNP '04 Proceedings of the 12th IEEE International Conference on Network Protocols
ICDCS '08 Proceedings of the 2008 The 28th International Conference on Distributed Computing Systems
On the application of pairing based cryptography to wireless sensor networks
Proceedings of the second ACM conference on Wireless network security
Wireless mesh networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Efficient hardware for the tate pairing calculation in characteristic three
CHES'05 Proceedings of the 7th international conference on Cryptographic hardware and embedded systems
Reducing authentication signaling traffic in third-generation mobile network
IEEE Transactions on Wireless Communications
SLAB: A secure localized authentication and billing scheme for wireless mesh networks
IEEE Transactions on Wireless Communications
Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications
Journal of Medical Systems
Ubiquitous-City Integrated Authentication System (UCIAS)
Journal of Intelligent Manufacturing
Hi-index | 0.00 |
Due to the ease of deployment and low cost, wireless mesh networks have been deployed in many metropolitan areas and business units. How to establish secure communications among the communication entities such as mesh routers and mobile clients (or mesh clients) even when roaming to different mesh networks (called mesh domains) is a challenging task. In this paper, we leverage the ID-based cryptography and propose a novel secure architecture to enable secure communications in large-scale multi-domain wireless mesh networks. Under this architecture, mesh clients can conveniently gain services securely even when roaming.