Security Authentication and an Undeniable Billing Protocol for WMNs

Wireless mesh networks (WMNs) are drawing attention for commercial applications. Service should be uninterrupted when roaming from one domain to another, security should be maintained, and billing should be accurate. However, conventional authentication and billing methods have drawbacks such as coordination between the home domain and foreign domains and the connectivity between them. In this paper, we first present a re-authentication method which enables a mobile mesh node to be authenticated by a foreign domain which may not be directly connected to the home domain. Even though the current foreign domain does not have connectivity to the home domain, it can consult one of the nearest foreign domains that has been visited by the mobile mesh node. In addition, we use the hash chain to provide correct billing for both users and service providers.

[1]  Ekram Hossain,et al.  Wireless Mesh Networks: Architectures and Protocols , 2008 .

[2]  Vallipuram Muthukkumarasamy,et al.  Securing Wireless Mesh Networks , 2008, IEEE Internet Computing.

[3]  Yuguang Fang,et al.  A secure authentication and billing architecture for wireless mesh networks , 2007, Wirel. Networks.

[4]  Seong-Choon Lee,et al.  Reducing Authorizing Registration Latency for Proxy Mobile IPv6 Route Optimization , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).

[5]  James B. D. Joshi,et al.  Inter-domain Authentication for Seamless Roaming in Heterogeneous Wireless Networks , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).

[6]  Chin-Ling Chen,et al.  A fair and secure mobile billing system , 2005, Comput. Networks.

[7]  Sangjin Kim,et al.  A New Authentication Protocol for IEEE 802.11 Using a Group Key Supporting Fast Handover , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).

[8]  Jean-Pierre Hubaux,et al.  Securing wireless mesh networks , 2006, IEEE Wireless Communications.

[9]  Dong Hoon Lee,et al.  Secure Mutual Authentication and Fair Billing for Roaming Service in Wireless Mobile Networks , 2008, 2008 Third International Conference on Convergence and Hybrid Information Technology.

[10]  J. David Irwin,et al.  Localized authentication for wireless LAN inter-networking roaming , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).

[11]  Emmanuel Bresson,et al.  Mutual authentication and group key agreement for low-power mobile devices , 2003, Comput. Commun..

[12]  Ian F. Akyildiz,et al.  Wireless mesh networks: a survey , 2005, Comput. Networks.