Authentication in Multi-Hop Wireless Mesh Networks

Wireless Mesh Networks (WMNs) are an emerging technology for last-mile broadband access. In WMNs, similar to ad hoc networks, each user node operates not only as a host but also as a router. User packets are forwarded to and from an Internet-connected gateway in multi-hop fashion. The WMNs can be integrated with other networking technologies i.e. ad hoc networks, to implement a smooth network extension. The meshed topology provides good reliability and scalability, as well as low upfront investments. Despite the recent start-up surge in WMNs, much research remains to be done in standardizing the functional parameters of WMNs to fully exploit their full potential. An edifice of the security concerns of these networks is authentication of a new client joining an integrated ad hoc network and such a scenario will require execution of a multihop authentication technique. Our endeavor in this paper is to introduce a secure authentication technique, with light over-heads that can be conveniently implemented for the ad-hoc nodes forming clients of an integrated WMN, thus facilitating their inter-operability. Keywords—Multi-Hop WMNs, PANA, EAP-TTLS, Authentication, RADIUS.

[1]  Ralph E. Droms,et al.  Dynamic Host Configuration Protocol , 1993, RFC.

[2]  寺岡 文男,et al.  Protocol for carrying Authentication for Network Access (PANA) を利用したネットワークアクセス認証システムの実装と検証 , 2007 .

[3]  Glen Zorn,et al.  Diameter Extensible Authentication Protocol (EAP) Application , 2005, RFC.

[4]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[5]  Bernard Aboba,et al.  RADIUS (Remote Authentication Dial In User Service) Support For Extensible Authentication Protocol (EAP) , 2003, RFC.

[6]  Brian Lloyd,et al.  PPP Authentication Protocols , 1992, RFC.

[7]  Ian F. Akyildiz,et al.  Wireless mesh networks: a survey , 2005, Comput. Networks.

[8]  Larry J. Blunk,et al.  PPP Extensible Authentication Protocol (EAP) , 1998, RFC.

[9]  Pedro Brandão,et al.  An Advanced Authorization Framework for IP-based B 3 G Systems , .

[10]  Glen Zorn,et al.  Protected EAP Protocol (PEAP) Version 2 , 2004 .

[11]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[12]  Mohan Parthasarathy,et al.  Protocol for Carrying Authentication and Network Access (PANA) Threat Analysis and Security Requirements , 2005, RFC.

[13]  Hugo Krawczyk,et al.  A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..

[14]  Dan Forsberg,et al.  Protocol for Carrying Authentication for Network Access (PANA) , 2008, RFC.

[15]  Dan Simon,et al.  PPP EAP TLS Authentication Protocol , 1999, RFC.

[16]  Jyh-Cheng Chen,et al.  Extensible authentication protocol (EAP) and IEEE 802.1x: tutorial and empirical experience , 2005, IEEE Communications Magazine.

[17]  William Allen Simpson,et al.  PPP Challenge Handshake Authentication Protocol (CHAP) , 1996, RFC.

[18]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[19]  Bernard Aboba,et al.  Extensible Authentication Protocol (EAP) , 2004, RFC.

[20]  Simon Blake-Wilson,et al.  EAP Tunneled TLS Authentication Protocol Version 1 (EAP-TTLSv1) , 2006 .

[21]  H. Chaouchi,et al.  Security architecture in a multi-hop mesh network 1 , 2006 .