{"title":"LEAS:基于身份代理签名的多运营商无线网状网络局部高效认证方案","authors":"Tianhan Gao , Nan Guo , Kangbin Yim","doi":"10.1016/j.mcm.2012.11.030","DOIUrl":null,"url":null,"abstract":"<div><p>Aiming at establishing secure access and communications for a multi-operator wireless mesh network (WMN), this paper proposes a localized efficient authentication scheme (LEAS) under a broker-based hierarchical security architecture and trust model. Mutual authentication is achieved directly between mesh client and access mesh router through a ticket which is equipped with an identity-based proxy signature. Fast authentication for different roaming scenarios is supported by using HMAC operations on both the mesh client side and mesh router side. As a byproduct, key agreement among network entities is also implemented to protect the subsequent communications after authentication. Our performance and security analysis demonstrate that LEAS is efficient and resilient to various kinds of attacks.</p></div>","PeriodicalId":49872,"journal":{"name":"Mathematical and Computer Modelling","volume":"58 5","pages":"Pages 1427-1440"},"PeriodicalIF":0.0000,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.mcm.2012.11.030","citationCount":"6","resultStr":"{\"title\":\"LEAS: Localized efficient authentication scheme for multi-operator wireless mesh network with identity-based proxy signature\",\"authors\":\"Tianhan Gao , Nan Guo , Kangbin Yim\",\"doi\":\"10.1016/j.mcm.2012.11.030\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>Aiming at establishing secure access and communications for a multi-operator wireless mesh network (WMN), this paper proposes a localized efficient authentication scheme (LEAS) under a broker-based hierarchical security architecture and trust model. Mutual authentication is achieved directly between mesh client and access mesh router through a ticket which is equipped with an identity-based proxy signature. Fast authentication for different roaming scenarios is supported by using HMAC operations on both the mesh client side and mesh router side. As a byproduct, key agreement among network entities is also implemented to protect the subsequent communications after authentication. Our performance and security analysis demonstrate that LEAS is efficient and resilient to various kinds of attacks.</p></div>\",\"PeriodicalId\":49872,\"journal\":{\"name\":\"Mathematical and Computer Modelling\",\"volume\":\"58 5\",\"pages\":\"Pages 1427-1440\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://sci-hub-pdf.com/10.1016/j.mcm.2012.11.030\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Mathematical and Computer Modelling\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0895717712003433\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Mathematical and Computer Modelling","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0895717712003433","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
LEAS: Localized efficient authentication scheme for multi-operator wireless mesh network with identity-based proxy signature
Aiming at establishing secure access and communications for a multi-operator wireless mesh network (WMN), this paper proposes a localized efficient authentication scheme (LEAS) under a broker-based hierarchical security architecture and trust model. Mutual authentication is achieved directly between mesh client and access mesh router through a ticket which is equipped with an identity-based proxy signature. Fast authentication for different roaming scenarios is supported by using HMAC operations on both the mesh client side and mesh router side. As a byproduct, key agreement among network entities is also implemented to protect the subsequent communications after authentication. Our performance and security analysis demonstrate that LEAS is efficient and resilient to various kinds of attacks.