Abstract
In wireless mesh networks, during handoff process, the mobile client needs to authenticate with other nodes. It is necessary to ensure secure communication between the mobile client and mesh nodes. However, using the conventional public key infrastructure requires a large overhead of storage requirement, since it has to deal with the management of the public key certifications. In the present paper, an ID-based signcryption authentication algorithm for intra- and inter-domain handoff has been proposed. In this solution, a proxy-based hierarchical network has been considered. To reduce the handoff latency, a caching-list-based pre-fetching technique has been applied. During inter-domain handoff, authentication messages are encrypted using ID signcryption and signed by the mesh clients. Thus, the proposed algorithm ensures high security along with fast handoff. It has been observed from simulation results that the proposed algorithm reduces the percentage of compromised nodes, authentication delay, and communication cost with increased packet delivery ratio.
Similar content being viewed by others
Abbreviations
- TR:
-
Root trust
- GW:
-
Gateway
- DM:
-
Domain manager
- MC1 :
-
Mobile client
- D 1 :
-
Current domain of MC1
- CLi :
-
Caching list of MNi
- MNi :
-
Mesh nodes, i = 1, 2, …, n
- RSSI:
-
Received signal strength indicator
- AReq:
-
Authentication request message
- AResp:
-
Authentication response message
- NGReq:
-
Neighbor request message
- NGResp:
-
Neighbor response message
- D1, D2 :
-
Network domains
- ID:
-
Identification
- X 1 :
-
Signcrypt parameter related to domain 1
- X 2 :
-
Signcrypt parameter related to domain 2
- Z 1 :
-
Random number
- Z 2 :
-
Random number
- P D1 :
-
Arbitrary generator of additive group in domain 1
- P D2 :
-
Arbitrary generator of additive group in domain 2
- G D11 :
-
Additive group of prime order in domain 1
- G D22 :
-
Additive group of prime order in domain 2
- Z qD1 :
-
Cryptography hash function result. HD13:{0,1}* × GD11 → ZqD1
- Z qD2 :
-
Cryptography hash function result. HD23:{0,1}* × GD22 → ZqD2
- AReq:
-
Authentication request message
- AResp:
-
Authentication response message
- Q MC1 :
-
Hash function value of the mesh node’s ID
- C encrypt :
-
Ciphertext
- H D22 :
-
Cryptography hash function of domain 2
- H D13 :
-
Cryptography hash function of domain 1
- E D1 :
-
Pairing of additive group in D1. GD11 × GD11 → GD12
- E D2 :
-
Pairing of additive group in D2. GD21 × GD21 → GD22
- Q MN2 :
-
Hash function value of the mesh node’s ID
- PuD1 :
-
Public key of domain 1
- PuD2 :
-
Public key of domain 2
- C sign :
-
Signed text value
- S MC1 :
-
Private key of mobile client
- S MN2 :
-
Private key of mesh node
- AReqsigncrypt :
-
Signcrypted authorization request message
References
Akilarasu G, Shalinie SM (2014) Trust based authentication and key establishment for secure routing in WMN. KSII Trans Internet Inf Syst (TIIS) 8(12):4661–4676
Akilarasu G, Shalinie SM (2017) Wormhole-free routing and DoS attack defense in wireless mesh networks. Wirel Netw 23(6):1709–1718
Daly I, Zarai F, Kamoun L (2011) A protocol for re-authentication and handoff notification in wireless mesh networks. Int J Comput Sci Issues 8(3):240
Gao T, Peng F, Guo N (2016) Anonymous authentication scheme based on identity-based proxy group signature for wireless mesh network. EURASIP J Wirel Commun Netw 2016(1):193
Ghosh S, Bhadra S, Bhattacharya I (2011) Group-key management model for worldwide wireless mesh networks. Int J Commun Netw Secur 1(2):7–14
Lai YM, Cheng PJ, Lee CC, Ku CY (2016) A new ticket-based authentication mechanism for fast handover in mesh network. PLoS ONE 11(5):e0155064. https://doi.org/10.1371/journal.pone.0155064
Li C, Nguyen UT, Nguyen HL, Huda N (2013) Efficient authentication for fast handover in wireless mesh networks. Comput Secur 37:124–142. https://doi.org/10.1016/j.cose.2013.06.001
Mahajan R, Sharma PK (2016) Authentication based secure protocol using TTP for WMN’s. In: 2016 3rd International conference on computing for sustainable global development (INDIACom). IEEE, pp 3286–3290
Mahajan R, Sharma PK, Surender (2016) Trust based secure routing with authentication for wireless mesh networks. Int J Control Theory Appl 9:33–38
Rathee G, Saini H (2016) A fast handoff technique in wireless mesh network (FHT for WMN). Procedia Comput Sci 79:722–728
Xiao P, He J, Fu Y (2012) Distributed group key management in wireless mesh networks. Int J Secur Appl 6(2):115–120
Xu L, He Y, Chen X, Huang X (2014) Ticket-based handoff authentication for wireless mesh networks. Comput Netw 73:185–194
Yang X, Zhang Y, Liu JK, Zeng Y (2016a) A trust and privacy preserving handover authentication protocol for wireless networks. In: Trustcom/BigDataSE/I SPA, 2016 IEEE, pp 138–143
Yang X, Huang X, Han J, Su C (2016b) Improved handover authentication and key pre-distribution for wireless mesh networks. Concurr Comput Pract Exp 28(10):2978–2990
Yin H, Ni H, Sun L, Wang M, Zhou X (2013) A caching-list based fast handoff mechanism in wireless mesh networks. In: 2013 International conference on ICT convergence (ICTC), pp 402–407. https://doi.org/10.1109/ictc.2013.6675382
Zhang X, Li G, Han W, Ji H (2015) A novel ID-based multi-domain handover protocol for mesh points in WMNs. TIIS 9(7):2512–2529
Zhu H, Lin X, Lu R, Ho PH (2008) SLAB: a secure localized authentication and billing scheme for wireless mesh networks. IEEE Trans Wirel Commun 7(10):3858–3868
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Sharma, P.K., Mahajan, R. & Surender ID-Based Signcryption Authentication Algorithm for Intra- and Inter-domain Handoff in Wireless Mesh Networks. Iran J Sci Technol Trans Electr Eng 44, 659–667 (2020). https://doi.org/10.1007/s40998-019-00258-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s40998-019-00258-8