Abstract
In this paper, we have proposed a secure handoff procedure by generating and assessing the tickets for each mesh client which are divided among various zones of mesh routers depending on their transmission range. Further, a trusted third party authentication server is proposed that is responsible for generating and assigning the tickets of each mesh client which are stored distributively at mesh routers. However, during the mobility whenever the range of current serving mesh router decreases, the mesh client needs to connect to a foreign mesh router by authenticating itself in order to continue its network services. The foreign mesh router validates the authenticity of its handoff mesh client by verifying its ticket. The proposed mechanism reduces the potential issue of storage overhead and security threats at mesh clients as all the tickets are stored distributively in the database of each mesh router. The proposed technique is validated with a commercial simulator NS2 over certain network parameters and different probabilistic scenarios of authentication.
Similar content being viewed by others
References
Zhu, L., Yu, F. R., Tang, T., & Ning, B. (2017). Handoff performance improvements in an integrated train-ground communication system based on wireless network virtualization. IEEE Transactions on Intelligent Transportation Systems, 18(5), 1165–1178.
Zhou, Z., Zhang, H., & Sun, Z. (2017). An improved privacy-aware handoff authentication protocol for VANETs. Wireless Personal Communications, 97(3), 3601–3618.
Khan, S., & Pathan, A. S. K. (2013). Wireless networks and security issues, challenges and research trends. London: Springer.
Dykema, K. A., Bouws, B. K., Doman, T. J., Leete, III, L. F. Schenck, W. C., & Guthrie, W. E. (2013). Wireless mesh network. U.S. Patent 8,274,928.
Wang, Z., Luo, Z. X., Zhang, J. L., & Saucan, E. (2016). ARAP++: An extension of the local/global approach to mesh parameterization. Frontiers of Information Technology and Electronic Engineering, 17(6), 501–515.
Srivatsa, A. M., & Xie, J. (19 May 2008). A performance study of mobile handoff delay in IEEE 802.11-based wireless mesh networks. In Proceedings of 1st international conference on communications (pp. 2485–2489). Beijing: IEEE.
Khabiri, M., & Ghaffari, A. (2018). Energy-aware clustering-based routing in wireless sensor networks using cuckoo optimization algorithm. Wireless Personal Communications, 98(3), 2473–2495.
Babu, M. R., & Usha, G. (2016). A novel honey pot based detection and isolation approach (NHBADI) to detect and isolate black hole attacks in MANET. Wireless Personal Communications, 90(2), 831–845.
Poongodi, T., & Karthikeyan, M. (2016). Localized secure routing architecture against cooperative black hole attack in mobile ad hoc networks. Wireless Personal Communications, 90(2), 1039–1050.
Purohit, K. C., Dimri, S. C., & Jasola, S. (2017). Mitigation and performance analysis of routing protocols under black-hole attack in vehicular ad hoc network (VANET). Wireless Personal Communications, 97(4), 5099–5114.
Anita, X., Bhagyaveni, M. A., & Manickam, J. M. L. (2015). Collaborative lightweight trust management scheme for wireless sensor networks. Wireless Personal Communications, 80(1), 117–140.
Labraoui, N., Gueroui, M., & Sekhri, L. (2016). A risk-aware reputation-based trust management in wireless sensor networks. Wireless Personal Communications, 87(3), 1037–1055.
Rathee, G., Saini, H., & Singh, G. (2018). Aspects of trusted routing communication in smart networks. Wireless Personal Communications, 98(2), 2367–2387.
Luo, M., & Wan, Y. (2018). An enhanced certificate less signcryption in the standard model. Wireless Personal Communications, 98(3), 2693–2709.
Bala, S., Sharma, G., & Verma, A. K. (2016). PF-ID-2PAKA: Pairing free identity-based two-party authenticated key agreement protocol for wireless sensor networks. Wireless Personal Communications, 87(3), 995–1012.
Cato, N. (2016). On next generation network security. IEEE Network, 31(2), 1–2.
Mansfield-Devine, S. (2017). File-less attacks: Compromising targets without malware. Network Security, 17(4), 7–11.
Xie, J., Hu, Y. P., Gao, J. T., & Gao, W. (2016). Efficient identity-based signature over NTRU lattice. Frontiers of Information Technology and Electronic Engineering, 17(2), 135–142.
Jiang, Q., Ma, J., Lu, X., & Tian, Y. (2015). An efficient two-factor user authentication scheme with unlink ability for wireless sensor networks. Journal of Peer-to-Peer Networking and Applications, 8(6), 1070–1081.
Shrivastava, G., Sharma, K., & Rai, S. (2010). The detection and defense of DoS and DDos attack: A technical overview. Proceedings of ICC, 27, 274–282.
Abbas, F., & Oh, H. (2014). A step towards user privacy while using location-based services. Journal of Information Processing Signals, 10(4), 618–627.
Zhang, H., Cheng, P., Shi, L., & Chen, J. (2016). Optimal DoS attack scheduling in wireless networked control system. IEEE Transactions on Control Systems Technology, 24(3), 843–852.
Tseng, Y. M. (2009). USIM-based EAP-TLS authentication protocol for wireless local area networks. Computer Standards & Interfaces, 31(1), 128–136.
Jayaraman, P., Lopez, R., Ohba, Y., Parthasarathy, M., & Yegin, A. (2008). Protocol for carrying authentication for network access (PANA). Framework no. RFC 5193.
Park, C., Hur, J., Kim, C., Shin, Y. J., & Yoon, H. (2006). Pre-authentication for fast handoff in wireless mesh networks with mobile APs. In Proceedings of international workshop on information security applications (pp. 349–363). Berlin: Springer.
Huang, C. M., & Li, J. W. (2009). A cluster-chain-based context transfer mechanism for fast basic service set transition in the centralized wireless LAN architecture. Wireless Communications and Mobile Computing, 9(10), 1387–1401.
Ruj, S., Nayak, A., & Stojmenovic, I. (2013). Pairwise and triple key distribution in wireless sensor networks with applications. IEEE Transactions on Computers, 62(11), 2224–2237.
Dalal, R., Singh, Y., & Khari, M. (2012). A review on key management schemes in MANET. International Journal of Distributed and Parallel Systems, 3(4), 165–172.
Fu, A., Zhang, Y., Zhu, Z., & Liu, X. (2010). A fast handover authentication mechanism based on ticket for IEEE 802.16m. IEEE Communications Letters, 14(12), 1134–1136.
Fu, A., Zhang, Y., Zhu, Z., Jing, Q., & Feng, J. (2012). An efficient handover authentication scheme with privacy preservation for IEEE 802.16m network. Computers and Security, 31(6), 741–749.
Xu, L., He, Y., Chen, X., & Huang, X. (2014). Ticket-based handoff authentication for wireless mesh networks. Computer Networks, 73, 185–194.
Li, J., Chen, X., Li, M., Li, J., Lee, P. P., & Lou, W. (2014). Secure de-duplication with efficient and reliable convergent key management. IEEE Transactions on Parallel and Distributed Systems, 25(6), 1615–1625.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Rathee, G., Jaglan, N., Saini, H. et al. Probabilistic Verification Scenarios with Reduced Authentication Delay for Handoff Clients in Mesh Networks. Wireless Pers Commun 104, 1553–1571 (2019). https://doi.org/10.1007/s11277-018-6098-2
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-018-6098-2