Authentication and authenticated key exchanges
Designs, Codes and Cryptography
Information and Computation
An unknown key-share attack on the MQV key agreement protocol
ACM Transactions on Information and System Security (TISSEC)
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Authenticated Multi-Party Key Agreement
ASIACRYPT '96 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
A secure incentive protocol for mobile ad hoc networks
Wireless Networks
Wireless Mesh Networks for Public Safety and Crisis Management Applications
IEEE Internet Computing
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks
IEEE Transactions on Mobile Computing
Wireless mesh networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Enhanced delegation-based authentication protocol for PCSs
IEEE Transactions on Wireless Communications
Protocols for Authentication and Key Establishment
Protocols for Authentication and Key Establishment
Examining indistinguishability-based proof models for key establishment protocols
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Emerging standards for wireless mesh technology
IEEE Wireless Communications
On Broadcast Authentication in Wireless Sensor Networks
IEEE Transactions on Wireless Communications
Mobile Privacy in Wireless Networks-Revisited
IEEE Transactions on Wireless Communications
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks
IEEE Transactions on Wireless Communications
An Efficient Mobile Authentication Scheme for Wireless Networks
IEEE Transactions on Wireless Communications
SLAB: A secure localized authentication and billing scheme for wireless mesh networks
IEEE Transactions on Wireless Communications
A survey on wireless mesh networks
IEEE Communications Magazine
Hi-index | 0.00 |
Wireless mesh networks (WMNs) are a kind of wireless ad hoc networks that are multi-hop where packets are forwarded from source to destination by intermediate notes as well as routers that form a kind of network infrastructure backbone. We investigate the security of the recently proposed first known secure authentication and billing architecture for WMNs which eliminates the need for bilateral roaming agreements and that for traditional home-foreign domains. We show that this architecture does not securely provide incontestable billing contrary to designer claims and furthermore it does not achieve entity authentication. We then present an enhanced scheme that achieves entity authentication and nonrepudiable billing.