Full metadata record
DC FieldValueLanguage
dc.contributorDepartment of Computingen_US
dc.creatorZhang, Yixiu-
dc.identifier.urihttps://theses.lib.polyu.edu.hk/handle/200/3935-
dc.languageEnglishen_US
dc.publisherHong Kong Polytechnic University-
dc.rightsAll rights reserveden_US
dc.titleAuthentication in wireless mesh networken_US
dcterms.abstractWireless Mesh Network (WMN) has drawn increasing attention as a promising technology providing the last-mile wireless access to the internet. Authentication is a must for Wireless Internet Service Providers and therefore must be studied WMN. Authentication means that claims made by or about the subject are true. In network environment, it's a method to prove that the user is authorized to the network service. Although there are many authentication methods used in wired network, they can be directly applied to the WMNs. This project is mainly on finding a suitable method that is secure and also provides fast authentication service in WMN. According to the feature of distributed network topology, we are also concern the method to reduce the communication overhead cost in authentication especially in re-authentication stage. The proposed protocol contains three stages, system initiation, original authentication and re-authentication. In the system initiation stage, Access Point (AP) registers to Authentication Server (AS) and obtains its CA (functional equivalent to Identity based certification) from AS by using the algorithm of bilinear paring on elliptic curve. CA is kept by AP itself for the further authentication. To obtain the greatest compatibility to the existing IEEE standard, our authentication framework is based on Extensible Authentication Protocol (EAP). The Authentication Server (AS) needs to have the user's information like ID and password in advance. According to the EAP authentication process and using the bilinear paring signature method, in this stage the protocol finishes the client registry to AS. To achieve the objective of being secure and fast at the same time, cryptology based on bilinear pair is used in re-authentication, used in the self-certified public signature scheme, which can provide the strong authentication between two entities. By using this kind of process, authenticator can verify the credible client and the client can verify the authenticator as well. In this way, "honey pot" attack can be eliminated because fake assess point can not declaim itself is credible. The new method has been implemented in the environment of windows and linux. The client site can be used in windows and linux, the AP site only support linux. Radius is used to support the authentication server service. Time tests are done on the test bed compare to 3 authentication protocols and process without authentication. With the theoretical proof, it can provide the strong authentication in the whole process and with the testing on test bed it proves that the time collapse also acceptable. It advantages is in the re-authentication stage which cuts down the authentication time to a low- level.en_US
dcterms.extentix, 89 p. : ill. ; 30 cm.en_US
dcterms.isPartOfPolyU Electronic Thesesen_US
dcterms.issued2009en_US
dcterms.educationalLevelAll Masteren_US
dcterms.educationalLevelM.Sc.en_US
dcterms.LCSHHong Kong Polytechnic University -- Dissertations.en_US
dcterms.LCSHWireless communication systems -- Security measures.en_US
dcterms.LCSHComputer security.en_US
dcterms.LCSHComputer networks -- Security measures.en_US
dcterms.accessRightsrestricted accessen_US

Files in This Item:
File Description SizeFormat 
b23181795.pdfFor All Users (off-campus access for PolyU Staff & Students only)2.31 MBAdobe PDFView/Open


Copyright Undertaking

As a bona fide Library user, I declare that:

  1. I will abide by the rules and legal ordinances governing copyright regarding the use of the Database.
  2. I will use the Database for the purpose of my research or private study only and not for circulation or further reproduction or any other purpose.
  3. I agree to indemnify and hold the University harmless from and against any loss, damage, cost, liability or expenses arising from copyright infringement or unauthorized usage.

By downloading any item(s) listed above, you acknowledge that you have read and understood the copyright undertaking as stated above, and agree to be bound by all of its terms.

Show simple item record

Please use this identifier to cite or link to this item: https://theses.lib.polyu.edu.hk/handle/200/3935