Skip to main content
Log in

Non-repudiable authentication and billing architecture for wireless mesh networks

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Wireless mesh networks (WMNs) are a kind of wireless ad hoc networks that are multi-hop where packets are forwarded from source to destination by intermediate notes as well as routers that form a kind of network infrastructure backbone. We investigate the security of the recently proposed first known secure authentication and billing architecture for WMNs which eliminates the need for bilateral roaming agreements and that for traditional home-foreign domains. We show that this architecture does not securely provide incontestable billing contrary to designer claims and furthermore it does not achieve entity authentication. We then present an enhanced scheme that achieves entity authentication and nonrepudiable billing.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Abdalla, M., Fouque, P.-A., & Pointcheval, D. (2006). Password-based authenticated key exchange in the three-party setting. IEE Proceedings-Information Security, 153(1), 27–39.

    Article  Google Scholar 

  2. Akyildiz, I. F., & Wang, X. (2005). A survey on wireless mesh networks. IEEE Communications Magazine, 43(9), S23–S30.

    Article  Google Scholar 

  3. Akyildiz, I. F., Wang, X., & Wang, W. (2005). Wireless mesh networks: A survey. Computer Networks, 47(4), 445–487.

    Article  MATH  Google Scholar 

  4. Boyd, C., & Mathuria, A. (2003). Protocols for authentication and key establishment. Berlin: Springer.

    Google Scholar 

  5. Choo, K.-K. R., Boyd, C., & Hitchcock, Y. (2005). Examining indistinguishability-based proof models of key establishment protocols. Advances in Cryptology-ASIACRYPT ’05 LNCS, 3788, 585–604.

    Article  MathSciNet  Google Scholar 

  6. Diffie, W.,van Oorschot, P. C., & Wiener, M. J. (1992). Authentication and authenticated key exchanges. Design, Codes and Cryptography, 2(2), 107–125.

    Article  Google Scholar 

  7. Gennaro, R., & Rohatgi, P. (2001). How to sign digital streams. Information and Computation, 165(1), 100–116.

    Article  MATH  MathSciNet  Google Scholar 

  8. Just, M., & Vaudenay, S. (1996). Authenticated multi-party key agreement. Advances in Cryptology-Asiacrypt ’96 LNCS, 1163, 36–49.

    Article  MathSciNet  Google Scholar 

  9. Kaliski, Jr., B. S. (2001). An unknown key-share attack on the MQV key agreement protocol. ACM TISSEC, 4(3), 275–288.

    Article  Google Scholar 

  10. Lee, T.-F., Chang, S.-H., Hwang, T., & Chong, S.-K. (2009). Enhanced delegation-based authentication protocol for PCSs. IEEE Transactions on Wireless Communications, 8(5), 2166–2171.

    Article  Google Scholar 

  11. Lee, M. J., Zheng, J., Ko, Y.-B., & Shrestha, D. M. (2006). Emerging standards for wireless mesh technology. IEEE Wireless Communications, 13(2), 56–63.

    Article  Google Scholar 

  12. Lin, X., Lu, R., Ho, P.-H., & Shen, X. S. (2008). TUA: A Novel compromise-resilient authentication architecture for wireless mesh networks. IEEE Transactions on Wireless Communications, 7(4), 1389–1399.

    Article  Google Scholar 

  13. Menezes, A. J., van Oorschot, P. C., & Vanstone, S. A. (1997). Handbook of applied cryptography. FL: CRC Press.

    MATH  Google Scholar 

  14. Portmann, M., & Pirzada, A. A. (2008). wireless mesh networks for public safety and crisis management applications. IEEE Internet Computing, 12(1), 18–25.

    Article  Google Scholar 

  15. Ren, K., Lou, W., Zeng, K., & Moran, P. J. (2007). On broadcast authentication in wireless sensor networks. IEEE Transactions on Wireless Communications, 6(11), 4136–4144.

    Article  Google Scholar 

  16. Tang, C., & Wu, D. O. (2008). mobile privacy in wireless networks–revisited. IEEE Transactions on Wireless Communications, 7(3), 1035–1042.

    Article  Google Scholar 

  17. Tang, C., & Wu, D. O. (2008). An efficient mobile authentication scheme for wireless networks. IEEE Transactions on Wireless Communications, 7(4), 1408–1416.

    Article  Google Scholar 

  18. Zhang ,Y., & Fang, Y. (2006). ARSA: An attack-resilient security architecture for multihop wireless mesh networks. IEEE Journal on Selected Areas in Communications, 24(10), 1916–1928.

    Article  MathSciNet  Google Scholar 

  19. Zhang, Y., & Fang, Y. (2007). A secure authentication and billing architecture for wireless mesh networks. Wireless Networks, 13(5), 663–678.

    Article  Google Scholar 

  20. Zhang, Y., Lou, W., & Fang, Y. (2007). A secure incentive protocol for mobile ad hoc networks. Wireless Networks, 13(5), 569–582.

    Article  Google Scholar 

  21. Zhou, Y., & Fang, Y. (2007). A Two-layer key establishment scheme for wireless sensor networks. IEEE Transactions on Mobile Computing, 6(9), 1009–1020.

    Article  Google Scholar 

  22. Zhu, H., Lin, X., Lu, R., Ho, P.-H., & Shen, X. S. (2008). SLAB: A secure localized authentication and billing scheme for wireless mesh networks. IEEE Transactions on Wireless Communications, 7(10), 3858–3868.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Raphael C.-W. Phan.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Phan, R.CW. Non-repudiable authentication and billing architecture for wireless mesh networks. Wireless Netw 17, 1055–1061 (2011). https://doi.org/10.1007/s11276-011-0334-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-011-0334-y

Keywords

Navigation