Performance Evaluation of Different CRL Distribution Schemes Embedded in WMN Authentication

  • Ahmet Onur Durahim
  • İsmail Fatih Yıldırım
  • Erkay Savaş
  • Albert Levi
Conference paper

Abstract

Wireless Mesh Networks (WMNs) have emerged as a promising technology to provide low cost and scalable solutions for high speed Internet access and additional services. In hybrid WMNs, where mesh clients also act as relaying agents and form a mesh client network, it is important to provide users with an efficient anonymous and accountable authentication scheme. Accountability is required for the malicious users that are to be identified and revoked from the network access and related services. Promising revocation schemes are based on Certification Revocation Lists (CRLs). Since in hybrid WMNs mesh clients also authenticate other clients, distribution of these CRLs is an important task. In this paper, we propose and examine the performance of different distribution schemes of CRLs and analyze authentication performance in two scenarios: in one scenario all mesh routers and mesh clients obtain CRLs and in the second one, CRLs are held only by the mesh routers and mesh clients acting as relaying agents require CRL checking to be performed from the router in authenticating another client.

References

  1. 1.
    Akyildiz, I.F., Wang, X., Wang, W.: Wireless mesh networks: a survey. Comput. Netw. 47(4), 445–487 (2005)MATHCrossRefGoogle Scholar
  2. 2.
    Durahim, A.O., Savaş, E.: A\(^{\text{2}}\)-MAKE: an efficient anonymous and accountable mutual authentication and key agreement protocol for WMNs. Ad Hoc Netw. 9(7), 1202–1220 (2011)Google Scholar
  3. 3.
    The ns-3 Network Simulator. http://www.nsnam.org. Accessed 02 March 2012

Copyright information

© Springer-Verlag London 2013

Authors and Affiliations

  • Ahmet Onur Durahim
    • 1
  • İsmail Fatih Yıldırım
    • 1
  • Erkay Savaş
    • 1
  • Albert Levi
    • 1
  1. 1.Sabanci UniversityIstanbulTurkey

Personalised recommendations