首页 | 本学科首页   官方微博 | 高级检索  
     


Securing wireless mesh networks in a unified security framework with corruption-resilience
Authors:Ze Wang  Maode Ma  Jigang Wu
Affiliation:1. State Key Laboratory of Organic Geochemistry, CAS Centre for Pearl River Delta Environmental Pollution and Control Research, Guangzhou Institute of Geochemistry, Chinese Academy of Sciences, Guangzhou 510640, China;2. Ministry of Agriculture Key Laboratory of Plant Nutrition and Nutrient Cycling, Institute of Agricultural Resources and Regional Planning, Chinese Academy of Agricultural Sciences, Beijing 100081, China;1. School of Mechanical Engineering, Tianjin Polytechnic University, Tianjin 300387, China;2. School of Computer Science & Software Engineering, Tianjin Key Laboratory of Optoelectronic Detection Technology and System, Tianjin Polytechnic University, Tianjin 300387, China;3. School of Computer, Guangdong University of Technology, Guangzhou 510006, China
Abstract:Wireless mesh networks (WMN) are expected to be widespread due to their excellent properties like low-cost deployment, easy arrangement and self-organization. Although some proposed security schemes for WMNs with various security objectives have been put forward recently, it is a challenge to employ a uniform cryptography context to achieve resilience to trust authority corruption and maintain trust relationships flexibly among different domains. In this paper, a unified security framework (USF) for multi-domain wireless mesh networks is proposed. The identity-based encryption and the certificateless signature are unified in the proposed cryptography operations utilizing bilinear groups to solve key escrow problem. To ensure secure muliti-hop communication in WMN, the intra and inter domain authentication and key agreement protocols are devised sophisticatedly to achieve perfect forward secrecy and attack-resilience. With the enhanced security properties in the USF scheme, when a trust authority is corrupted, parts of the WMN could be survivable in the local area if proper measures are taken. A formal security proof of the proposed authentication protocols is presented based on Universal Composable security theory. The detailed performance analysis shows that the enhanced security attributes are achieved with reasonable overhead.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号