首页 | 本学科首页   官方微博 | 高级检索  
     


Design of certification authority using secret redistribution and multicast routing in wireless mesh networks
Authors:Jongtack Kim  Saewoong Bahk
Affiliation:1. School of Automation, Nanjing University of Science and Technology, Nanjing 210094, PR China;2. Shanghai Key Laboratory of Multiphase Flow and Heat Transfer in Power Engineering, Shanghai 200093, PR China;1. Department of Computer Engineering, West Tehran Branch, Islamic Azad University, Tehran, Iran;2. Department of Mathematics, University of Padua, Padua, Italy;3. Department of Computer Science, Aalto University and University of Helsinki, Helsinki, Finland;1. Digital Security, Institute for Computing and Information Sciences, Radboud University, Toernooiveld 212, Nijmegen, The Netherlands;2. Faculty of Management, Science & Technology, Open University of the Netherlands, Valkenburgerweg 177, Heerlen, The Netherlands
Abstract:Wireless mesh networks (WMNs) should provide authentication and key management without a trusted third party because of their self-organizing and self-configuring characteristics. Several solutions to this problem have been proposed in mobile ad hoc networks (MANETs). But they are not optimal for WMNs because WMNs are with stationary mesh routers (MRs) that do not suffer from the limited power problem. In this paper, we design an architecture of mesh certification authority (MeCA) for WMNs. In MeCA, the secret key and functions of certification authority (CA) are distributed over several MRs. For secret sharing and redistribution, we develop the fast verifiable share redistribution (FVSR) scheme, which works for threshold cryptography and minimizes the possibility of secret disclosure when some shareholders are compromised by adversaries. MeCA adopts the multicasting based on Ruiz tree, which is optimal in reducing the operation overhead. It can update, revoke, and verify certificates of WMN nodes in a secure and efficient manner. Simulation results show that MeCA does not disclose its secret key even under severe attacks while incurring low overhead compared to other existing schemes in MANETs.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号