An Efficient Protocol for Authenticated Key Agreement
Designs, Codes and Cryptography
Pre-Authenticated Fast Handoff in a Public Wireless LAN Based on IEEE 802.1x Model
PWC '02 Proceedings of the IFIP TC6/WG6.8 Working Conference on Personal Wireless Communications
An empirical analysis of the IEEE 802.11 MAC layer handoff process
ACM SIGCOMM Computer Communication Review
Security in Wireless Mesh Networks: Challenges and Solutions
ITNG '09 Proceedings of the 2009 Sixth International Conference on Information Technology: New Generations
Kerberos based authentication for inter-domain roaming in wireless heterogeneous network
Computers & Mathematics with Applications
Privacy preserving context transfer schemes for 4G networks
Wireless Communications & Mobile Computing
IEEE Communications Surveys & Tutorials
On the security of public key protocols
IEEE Transactions on Information Theory
A survey on wireless mesh networks
IEEE Communications Magazine
Efficient and robust identity-based handoff authentication in wireless networks
NSS'12 Proceedings of the 6th international conference on Network and System Security
Hi-index | 0.00 |
WMNs (Wireless Mesh Networks) are a new wireless broadband network structure based completely on IP technologies and have rapidly become a broadband access measure to offer high capacity, high speed and wide coverage. Trusted handoff in WMNs requires that mobile nodes complete access authentication not only with a short delay, but also with the security protection for the mobile nodes as well as the handoff network. In this paper, we propose a trusted handoff protocol based on several technologies, such as hierarchical network model, ECC (Elliptic Curve Cryptography), trust evaluation and gray relevance analysis. In the protocol, the mobile platform's configuration must be measured before access to the handoff network can proceed and only those platforms whose configuration meets the security requirements can be allowed to access the network. We also verify the security properties through formal analysis based on an enhanced Strand model and evaluate the performance of the proposed protocol through simulation to show that our protocol is more advantageous than the EMSA (Efficient Mesh Security Association) authentication scheme in terms of success rate and average delay.