An authentication scheme for IEEE 802.11s mesh networks relying on Sakai-Kasahara ID-Based Cryptographic algorithms

Aymen Boudguiga, M. Laurent-Maknavicius
{"title":"An authentication scheme for IEEE 802.11s mesh networks relying on Sakai-Kasahara ID-Based Cryptographic algorithms","authors":"Aymen Boudguiga, M. Laurent-Maknavicius","doi":"10.1109/ComNet.2012.6217728","DOIUrl":null,"url":null,"abstract":"Nowadays authentication in Wireless Mesh Networks (WMN) refers to the 802.1X authentication methods or a Preshared key authentication, and makes use of certifcates or shared secrets. In wireless environments, the management of certifcates is a cumbersome task as certifcates require deploying a Public Key Infrastructure (PKI) and Certifcation Authorities (CA). They also require defning a certifcate management policy to control the generation, transmission and revocation of certifcates. During the last decade, ID-Based Cryptography (IBC) appeared as a good alternative to PKI. IBC proposes to derive the public key from the node's identity directly thanks to the use of a Private Key Generator (PKG). In this article, we present an authentication method relying on an ID-Based signature and encryption schemes that use the Sakai-Kasahara key construction. The resulted authentication scheme is suitable to IEEE 802.11s mesh networks and resistant to the key escrow attack.","PeriodicalId":296060,"journal":{"name":"Third International Conference on Communications and Networking","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Third International Conference on Communications and Networking","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ComNet.2012.6217728","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Nowadays authentication in Wireless Mesh Networks (WMN) refers to the 802.1X authentication methods or a Preshared key authentication, and makes use of certifcates or shared secrets. In wireless environments, the management of certifcates is a cumbersome task as certifcates require deploying a Public Key Infrastructure (PKI) and Certifcation Authorities (CA). They also require defning a certifcate management policy to control the generation, transmission and revocation of certifcates. During the last decade, ID-Based Cryptography (IBC) appeared as a good alternative to PKI. IBC proposes to derive the public key from the node's identity directly thanks to the use of a Private Key Generator (PKG). In this article, we present an authentication method relying on an ID-Based signature and encryption schemes that use the Sakai-Kasahara key construction. The resulted authentication scheme is suitable to IEEE 802.11s mesh networks and resistant to the key escrow attack.
基于Sakai-Kasahara id加密算法的IEEE 802.11s网状网络认证方案
目前无线Mesh网络(Wireless Mesh Networks, WMN)中的身份验证是指802.1X认证方法或预共享密钥认证,并利用证书或共享秘密。在无线环境中,证书管理是一项繁琐的任务,因为证书需要部署公钥基础设施(PKI)和证书颁发机构(CA)。它们还需要定义一个证书管理策略来控制证书的生成、传输和撤销。在过去十年中,基于id的加密技术(IBC)作为PKI的一个很好的替代方案出现了。由于使用了私钥生成器(Private key Generator, PKG), IBC建议直接从节点的身份中派生公钥。在本文中,我们提出了一种依赖于基于id的签名和使用Sakai-Kasahara密钥构造的加密方案的身份验证方法。该认证方案适用于IEEE 802.11s网状网络,并能抵抗密钥托管攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信