Authentication in wireless mesh network

Pao Yue-kong Library Electronic Theses Database

Authentication in wireless mesh network


Author: Zhang, Yixiu
Title: Authentication in wireless mesh network
Degree: M.Sc.
Year: 2009
Subject: Hong Kong Polytechnic University -- Dissertations.
Wireless communication systems -- Security measures.
Computer security.
Computer networks -- Security measures.
Department: Dept. of Computing
Pages: ix, 89 p. : ill. ; 30 cm.
Language: English
InnoPac Record:
Abstract: Wireless Mesh Network (WMN) has drawn increasing attention as a promising technology providing the last-mile wireless access to the internet. Authentication is a must for Wireless Internet Service Providers and therefore must be studied WMN. Authentication means that claims made by or about the subject are true. In network environment, it's a method to prove that the user is authorized to the network service. Although there are many authentication methods used in wired network, they can be directly applied to the WMNs. This project is mainly on finding a suitable method that is secure and also provides fast authentication service in WMN. According to the feature of distributed network topology, we are also concern the method to reduce the communication overhead cost in authentication especially in re-authentication stage. The proposed protocol contains three stages, system initiation, original authentication and re-authentication. In the system initiation stage, Access Point (AP) registers to Authentication Server (AS) and obtains its CA (functional equivalent to Identity based certification) from AS by using the algorithm of bilinear paring on elliptic curve. CA is kept by AP itself for the further authentication. To obtain the greatest compatibility to the existing IEEE standard, our authentication framework is based on Extensible Authentication Protocol (EAP). The Authentication Server (AS) needs to have the user's information like ID and password in advance. According to the EAP authentication process and using the bilinear paring signature method, in this stage the protocol finishes the client registry to AS. To achieve the objective of being secure and fast at the same time, cryptology based on bilinear pair is used in re-authentication, used in the self-certified public signature scheme, which can provide the strong authentication between two entities. By using this kind of process, authenticator can verify the credible client and the client can verify the authenticator as well. In this way, "honey pot" attack can be eliminated because fake assess point can not declaim itself is credible. The new method has been implemented in the environment of windows and linux. The client site can be used in windows and linux, the AP site only support linux. Radius is used to support the authentication server service. Time tests are done on the test bed compare to 3 authentication protocols and process without authentication. With the theoretical proof, it can provide the strong authentication in the whole process and with the testing on test bed it proves that the time collapse also acceptable. It advantages is in the re-authentication stage which cuts down the authentication time to a low- level.

Files in this item

Files Size Format
b23181795.pdf 2.360Mb PDF
Copyright Undertaking
As a bona fide Library user, I declare that:
  1. I will abide by the rules and legal ordinances governing copyright regarding the use of the Database.
  2. I will use the Database for the purpose of my research or private study only and not for circulation or further reproduction or any other purpose.
  3. I agree to indemnify and hold the University harmless from and against any loss, damage, cost, liability or expenses arising from copyright infringement or unauthorized usage.
By downloading any item(s) listed above, you acknowledge that you have read and understood the copyright undertaking as stated above, and agree to be bound by all of its terms.


Quick Search


More Information