Skip to main content
Log in

ID-Based Signcryption Authentication Algorithm for Intra- and Inter-domain Handoff in Wireless Mesh Networks

  • Research Paper
  • Published:
Iranian Journal of Science and Technology, Transactions of Electrical Engineering Aims and scope Submit manuscript

Abstract

In wireless mesh networks, during handoff process, the mobile client needs to authenticate with other nodes. It is necessary to ensure secure communication between the mobile client and mesh nodes. However, using the conventional public key infrastructure requires a large overhead of storage requirement, since it has to deal with the management of the public key certifications. In the present paper, an ID-based signcryption authentication algorithm for intra- and inter-domain handoff has been proposed. In this solution, a proxy-based hierarchical network has been considered. To reduce the handoff latency, a caching-list-based pre-fetching technique has been applied. During inter-domain handoff, authentication messages are encrypted using ID signcryption and signed by the mesh clients. Thus, the proposed algorithm ensures high security along with fast handoff. It has been observed from simulation results that the proposed algorithm reduces the percentage of compromised nodes, authentication delay, and communication cost with increased packet delivery ratio.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Abbreviations

TR:

Root trust

GW:

Gateway

DM:

Domain manager

MC1 :

Mobile client

D 1 :

Current domain of MC1

CLi :

Caching list of MNi

MNi :

Mesh nodes, i = 1, 2, …, n

RSSI:

Received signal strength indicator

AReq:

Authentication request message

AResp:

Authentication response message

NGReq:

Neighbor request message

NGResp:

Neighbor response message

D1, D2 :

Network domains

ID:

Identification

X 1 :

Signcrypt parameter related to domain 1

X 2 :

Signcrypt parameter related to domain 2

Z 1 :

Random number

Z 2 :

Random number

P D1 :

Arbitrary generator of additive group in domain 1

P D2 :

Arbitrary generator of additive group in domain 2

G D11 :

Additive group of prime order in domain 1

G D22 :

Additive group of prime order in domain 2

Z qD1 :

Cryptography hash function result. HD13:{0,1}* × GD11 → ZqD1

Z qD2 :

Cryptography hash function result. HD23:{0,1}* × GD22 → ZqD2

AReq:

Authentication request message

AResp:

Authentication response message

Q MC1 :

Hash function value of the mesh node’s ID

C encrypt :

Ciphertext

H D22 :

Cryptography hash function of domain 2

H D13 :

Cryptography hash function of domain 1

E D1 :

Pairing of additive group in D1. GD11 × GD11 → GD12

E D2 :

Pairing of additive group in D2. GD21 × GD21 → GD22

Q MN2 :

Hash function value of the mesh node’s ID

PuD1 :

Public key of domain 1

PuD2 :

Public key of domain 2

C sign :

Signed text value

S MC1 :

Private key of mobile client

S MN2 :

Private key of mesh node

AReqsigncrypt :

Signcrypted authorization request message

References

  • Akilarasu G, Shalinie SM (2014) Trust based authentication and key establishment for secure routing in WMN. KSII Trans Internet Inf Syst (TIIS) 8(12):4661–4676

    Google Scholar 

  • Akilarasu G, Shalinie SM (2017) Wormhole-free routing and DoS attack defense in wireless mesh networks. Wirel Netw 23(6):1709–1718

    Article  Google Scholar 

  • Daly I, Zarai F, Kamoun L (2011) A protocol for re-authentication and handoff notification in wireless mesh networks. Int J Comput Sci Issues 8(3):240

    Google Scholar 

  • Gao T, Peng F, Guo N (2016) Anonymous authentication scheme based on identity-based proxy group signature for wireless mesh network. EURASIP J Wirel Commun Netw 2016(1):193

    Article  Google Scholar 

  • Ghosh S, Bhadra S, Bhattacharya I (2011) Group-key management model for worldwide wireless mesh networks. Int J Commun Netw Secur 1(2):7–14

    Google Scholar 

  • Lai YM, Cheng PJ, Lee CC, Ku CY (2016) A new ticket-based authentication mechanism for fast handover in mesh network. PLoS ONE 11(5):e0155064. https://doi.org/10.1371/journal.pone.0155064

    Article  Google Scholar 

  • Li C, Nguyen UT, Nguyen HL, Huda N (2013) Efficient authentication for fast handover in wireless mesh networks. Comput Secur 37:124–142. https://doi.org/10.1016/j.cose.2013.06.001

    Article  Google Scholar 

  • Mahajan R, Sharma PK (2016) Authentication based secure protocol using TTP for WMN’s. In: 2016 3rd International conference on computing for sustainable global development (INDIACom). IEEE, pp 3286–3290

  • Mahajan R, Sharma PK, Surender (2016) Trust based secure routing with authentication for wireless mesh networks. Int J Control Theory Appl 9:33–38

    Google Scholar 

  • Rathee G, Saini H (2016) A fast handoff technique in wireless mesh network (FHT for WMN). Procedia Comput Sci 79:722–728

    Article  Google Scholar 

  • Xiao P, He J, Fu Y (2012) Distributed group key management in wireless mesh networks. Int J Secur Appl 6(2):115–120

    Google Scholar 

  • Xu L, He Y, Chen X, Huang X (2014) Ticket-based handoff authentication for wireless mesh networks. Comput Netw 73:185–194

    Article  Google Scholar 

  • Yang X, Zhang Y, Liu JK, Zeng Y (2016a) A trust and privacy preserving handover authentication protocol for wireless networks. In: Trustcom/BigDataSE/I SPA, 2016 IEEE, pp 138–143

  • Yang X, Huang X, Han J, Su C (2016b) Improved handover authentication and key pre-distribution for wireless mesh networks. Concurr Comput Pract Exp 28(10):2978–2990

    Article  Google Scholar 

  • Yin H, Ni H, Sun L, Wang M, Zhou X (2013) A caching-list based fast handoff mechanism in wireless mesh networks. In: 2013 International conference on ICT convergence (ICTC), pp 402–407. https://doi.org/10.1109/ictc.2013.6675382

  • Zhang X, Li G, Han W, Ji H (2015) A novel ID-based multi-domain handover protocol for mesh points in WMNs. TIIS 9(7):2512–2529

    Google Scholar 

  • Zhu H, Lin X, Lu R, Ho PH (2008) SLAB: a secure localized authentication and billing scheme for wireless mesh networks. IEEE Trans Wirel Commun 7(10):3858–3868

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Parveen Kumar Sharma.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sharma, P.K., Mahajan, R. & Surender ID-Based Signcryption Authentication Algorithm for Intra- and Inter-domain Handoff in Wireless Mesh Networks. Iran J Sci Technol Trans Electr Eng 44, 659–667 (2020). https://doi.org/10.1007/s40998-019-00258-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s40998-019-00258-8

Keywords

Navigation