Formal Verification of Secure Authentication in Wireless Mesh Network (SAWMN)

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 381)


Wireless mesh network (WMN) is considered to be an evolving technique because of self-configuration and adaptive features, and it supports large-scale network especially in an organization and academics. As with any network, communication among nodes plays an important role, when two nodes in a network communicate with each other via the internet, secure authentication is an imperative challenge. In literature, there are many approaches that have been suggested to deliver a secure authentication between nodes in WMN; however, all these outlines contain some disadvantages, i.e., management cost of the public key and system complexity. In this paper, a Secure Authentication in Wireless Mesh Network (SAWMN) approach is proposed which overcomes these drawbacks and provides an efficient authentication to the mesh clients. Further, SAWMN results have been shown simulated on AVISPA SPAN to ascertain the authenticity of the proposed approach.


Wireless mesh network Authentication AVISPA SPAN SAWMN 


  1. 1.
    Akyildiz, I.F., Wang, X., Wang, W.: A survey on wireless mesh networks. IEEE Radio Commun. 47(4), 445–487 (2005)Google Scholar
  2. 2.
    Zhou, L., Zygmunt, Hass, J.: Securing adhoc networks. IEEE Networks 24–30 (1999)Google Scholar
  3. 3.
    Egners, A., Meyer, U.: Wireless mesh network security: state of affairs. IEEE 35th on Conference on Local Computer Networks, 997–1004 (2010)Google Scholar
  4. 4.
    Wu, T., Xue, Y., Cui, Y.: Preserving traffic privacy in wireless mesh networks. Proceedings of the International Symposium on a World of Wireless, Mobile and Multi-media Networks (WoWMoM‘06), pp. 459–461 (2006)Google Scholar
  5. 5.
    Sen, J., Chowdhury, P.R., Sengupta, I.: A distributed trust mechanism for mobile ad hoc networks. Proceedings of the international symposium on ad hoc and ubiq-uitous computing (ISAHUC’06), pp. 20–23 (2006)Google Scholar
  6. 6.
    Sen, J.: A robust and efficient node authentication protocol for mobile ad hoc net-works. Proceedings of the 2nd IEEE International Conference on Computational In-telligence, Modelling and Simulation (CIMSiM 2010), pp. 476–481 (2010)Google Scholar
  7. 7.
    IEEE P802.11 s/D2.06:part 11: Wireless LAN MAC and physical layer significance. Amendment 10: Mesh Networking. IEEE Working Draft Proposed standard, Rev.2.06, (2009)Google Scholar
  8. 8.
    Mishra, A., Arbaugh, W.A.: An initial security analysis of the IEEE 802.1X stand-ard. Computer Science Department Technical Report CS-TR-4328, University of Mary-land, USA, pp. 1–12 (2002)Google Scholar
  9. 9.
    Kassab, M., Belghith, A., Bonnin, J.M. Sassi, S.: Fast Pre-Authentication Based on Proactive Key Distribution for 802.11 Infrastructure Networks. Proceedings of the 1st ACM Workshop on Wireless Multimedia Networking and performance modeling, pp. 46–53 (2005)Google Scholar
  10. 10.
    Prasad, A.R., Wang, H.: Roaming key based fast handover in WLANs. Proceed-ings of IEEE Wireless Communications and Networking Conference (WCNC 2003), 2005, pp. 1570–1576, vol. 3, (2005)Google Scholar
  11. 11.
    Salem, N.B., Hubaux, J.P.: Securing wireless mesh networks. IEEE Wireless Commun. 13(2), 50–55 (2006)Google Scholar
  12. 12.
    Cheikhrouhou, O., Laurent-Maknavicius, M., Chaouchi, H.: Security architecture in a multi-hop mesh network. 5th Conference on Safety and Architectures Networks, SAR 2006, Seignosse, Landes, France, pp. 1–10 (2006)Google Scholar
  13. 13.
    Parthasarathy, M.: Protocol for carrying authentication and network access (PANA): threat analysis and security requirements RFC 4016,” The Internet Society, pp. 1–15 (2005)Google Scholar
  14. 14.
    Zhu, S., Xu, S., Setia, S., Jajodia, S.: LHAP: A lightweight hop-by-hop authentica-tion protocol for ad-hoc networks. Proceedings of the 23rd IEEE International Confer-ence on Distributed Computing Systems Workshops (ICDCSW’03), pp. 749–755 (2003)Google Scholar
  15. 15.
    Zhu, S., Xu, S., Setia, S., Jajodia, S.: LHAP: a lightweight network access control protocol for ad hoc networks. Ad Hoc Networks 4(5), 567–585 (2006)Google Scholar
  16. 16.
    Moustafa, H.: Providing authentication, trust, and privacy in wireless mesh networks. In: Zhang, Y., et al. (eds.) Security in Wireless Mesh Networks, pp. 261–295. CRC Press, USA (2007)Google Scholar
  17. 17.
    Zhu, H., Lin, X., Lu, R., Ho, H. P., Shen, X.: A secure localized authentication and billing scheme for wireless mesh networks. IEEE Trans. Wireless Commun. 7(10), 3858–3868 (2008)Google Scholar
  18. 18.
    He, B., Joshi, S., Agrawal, D. P., Sun, D.: An efficient authenticated key establish-ment scheme for wireless mesh networks. Proceedings of IEEE Global Telecommuni-cations Conference (GLOBECOM’10), pp. 1–5 (2010)Google Scholar
  19. 19.
    Sun, J., Zhang, C., Zhang, Y., Fang, Y.: SAT: a security architecture achieving anonymity and traceability in wireless mesh networks. IEEE Trans. Depend-able Secure Comput. 8(2), 295–307 (2011)Google Scholar
  20. 20.
    Gao, T., Guo, N., Yim, K.: Delegation-based mutual authentication scheme for multi operator wireless mesh networks. Proceedings of (IMIS2012), pp. 143–147 (2012)Google Scholar
  21. 21.
    Boneh, D., Franklin, M.: Identity based encryption from the Weil Pairing. SIAM J. Comput. 32(3), 586–615 (2003)Google Scholar
  22. 22.
    Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. Proceed-ings of Advances in Cryptology—AsiaCrypt 2001, Lecture Notes in Computer Science, vol. 2248, pp. 514–532. Springer-Verlag (2001)Google Scholar
  23. 23.
    AVISPA Team: HLPSL Tutorial. Retrieved 9th Dec 2014
  24. 24.
    Lamport, L.: The temporal logic of actions. ACM Trans. Programm. Languages Syst. 16(3), 872–923 (1994)Google Scholar
  25. 25.
    Lamport, L.: Specifying Systems. Addison-Wesley (2002)Google Scholar

Copyright information

© Springer India 2016

Authors and Affiliations

  1. 1.Department of Computer Science and TechnologyJaypee University of Information TechnologyWaknaghatIndia

Personalised recommendations