Skip to main content

Performance Evaluation of Different CRL Distribution Schemes Embedded in WMN Authentication

  • Conference paper
  • First Online:
  • 1041 Accesses

Abstract

Wireless Mesh Networks (WMNs) have emerged as a promising technology to provide low cost and scalable solutions for high speed Internet access and additional services. In hybrid WMNs, where mesh clients also act as relaying agents and form a mesh client network, it is important to provide users with an efficient anonymous and accountable authentication scheme. Accountability is required for the malicious users that are to be identified and revoked from the network access and related services. Promising revocation schemes are based on Certification Revocation Lists (CRLs). Since in hybrid WMNs mesh clients also authenticate other clients, distribution of these CRLs is an important task. In this paper, we propose and examine the performance of different distribution schemes of CRLs and analyze authentication performance in two scenarios: in one scenario all mesh routers and mesh clients obtain CRLs and in the second one, CRLs are held only by the mesh routers and mesh clients acting as relaying agents require CRL checking to be performed from the router in authenticating another client.

Erkay Savaş, and Ahmet Onur Durahim are supported by the Scientific and Technological Research Council of Turkey (TUBITAK) under Project number 105E089. Albert Levi and İsmail Fatih Yıldırım are supported by Turk Telekom under Grant Number 3014-01.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    This list is named as UserRL in A\(^2\)-MAKE.

References

  1. Akyildiz, I.F., Wang, X., Wang, W.: Wireless mesh networks: a survey. Comput. Netw. 47(4), 445–487 (2005)

    Article  MATH  Google Scholar 

  2. Durahim, A.O., Savaş, E.: A\(^{\text{2}}\)-MAKE: an efficient anonymous and accountable mutual authentication and key agreement protocol for WMNs. Ad Hoc Netw. 9(7), 1202–1220 (2011)

    Google Scholar 

  3. The ns-3 Network Simulator. http://www.nsnam.org. Accessed 02 March 2012

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Albert Levi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag London

About this paper

Cite this paper

Durahim, A.O., Yıldırım, İ.F., Savaş, E., Levi, A. (2013). Performance Evaluation of Different CRL Distribution Schemes Embedded in WMN Authentication. In: Gelenbe, E., Lent, R. (eds) Computer and Information Sciences III. Springer, London. https://doi.org/10.1007/978-1-4471-4594-3_34

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-4594-3_34

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-4593-6

  • Online ISBN: 978-1-4471-4594-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics