Threshold based Authorization model for Authentication of a node in Wireless Mesh Networks
نویسندگان
چکیده
---------------------------------------------------------------------------ABSTRACT------------------------------------------------------------------------------As various wireless networks evolve into the next generation to provide better services, a key technology, wireless mesh networks (WMNs), has emerged recently. There are number of issues in the deployment of WMNs. Amongst others security is quite a serious issue. Authenticating the users and devices in the network is a key point of network security. IEEE 802.11s mesh networks do not have any well defined or specified security architecture which can cater to large number of diversified applications. As the major characteristic of WMNs is multihop therefore using the 802.11i as the security standard is inadequate to provide security in Wireless Mesh Networks primarily because 802.11i was designed with the central security mechanism. In this paper a new approach using threshold authorization model with Clustered Certificate Authority is proposed which caters to the best of both the centralized and distributed architecture.
منابع مشابه
Survey on Security Mechanisms in Wireless Mesh Networks
Wireless Mesh Networking is an emerging technology in order to provide a possibility to build a network that can grow in terms of coverage to offer service access (i.e. internet access) for a large number of people with different needs. Security has become the main concern to provide safe communication between different mesh nodes. The aim of this research is to study various security mechanism...
متن کاملDistributed Authentication and Key Management in Wireless Mesh Networks
Authentication and Key Management (AKM) in Wireless Networks have been addressed in the IEEE 802.11i standard [10]. However, the IEEE 802.11s [21] Wireless Mesh Networks impose some further AKM requirements due to their large scale, distributed functionalities and decentralized authority. According to the IEEE 802.11s specifications, any security solutions should rely on IEEE 802.11i mechanisms...
متن کاملOptimal Node Placement in Distributed Wireless Security Architectures
Wireless mesh networks (WMNs) are currently accepted as a new communication paradigm for next-generation wireless networking. They consist of mesh routers and clients, where mesh routers are almost static and form the backbone of WMNs. Several architectures have been proposed to distribute the authentication and authorization functions in the WMN backbone. In such distributed architectures, new...
متن کاملDecentralized Routing and Power Allocation in FDMA Wireless Networks based on H∞ Fuzzy Control Strategy
Simultaneous routing and resource allocation has been considered in wireless networks for its performance improvement. In this paper we propose a cross-layer optimization framework for worst-case queue length minimization in some type of FDMA based wireless networks, in which the the data routing and the power allocation problem are jointly optimized with Fuzzy distributed H∞ control strategy ....
متن کاملHypercube Bivariate-Based Key Management for Wireless Sensor Networks
Wireless sensor networks are composed of very small devices, called sensor nodes,for numerous applications in the environment. In adversarial environments, the securitybecomes a crucial issue in wireless sensor networks (WSNs). There are various securityservices in WSNs such as key management, authentication, and pairwise keyestablishment. Due to some limitations on sensor nodes, the previous k...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010