A Blockchain-Based Authentication Protocol for WLAN Mesh Security Access

As a brand-new network structure, WLAN mesh network has high capacity, high speed and wide coverage.But security issues have become a main hindrance to enlarge WLAN mesh network business. This paper provides a new Blockchain-Based Authentication Protocol for WLAN Mesh Security Access Scheme, to resolve the issues of requiring key delivery and central server during IEEE 802.11i and IEEE 802.11s authentication. This method takes the user’s authentication request as a transaction, considers all the authentication records in the mesh network as the public ledger and realizes the effective monitoring of the malicious attack. Lastly this paper analyzes the security of the Protocol in detail,and proves this method can solve the dependence of the authentication node on PKI and CA.

[1]  Iftekhar Hussain,et al.  An Efficient TDMA MAC Protocol for Multi-hop WiFi-Based Long Distance Networks , 2016, Wirel. Pers. Commun..

[2]  Bart Preneel,et al.  RIPEMD-160: A Strengthened Version of RIPEMD , 1996, FSE.

[3]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[4]  Mohsen Guizani,et al.  MeDShare: Trust-Less Medical Data Sharing Among Cloud Service Providers via Blockchain , 2017, IEEE Access.

[5]  Eli Ben-Sasson,et al.  Zerocash: Decentralized Anonymous Payments from Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.

[6]  Arjuna Sathiaseelan,et al.  Software-defined wireless mesh networks for internet access sharing , 2015, Comput. Networks.

[7]  Kun Yang,et al.  A Security Sandbox Approach of Android Based on Hook Mechanism , 2018, Secur. Commun. Networks.

[8]  Kartik Nayak,et al.  Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).

[9]  Ulrike Meyer,et al.  Experiences from security research using a Wireless Mesh Network testbed , 2013, 38th Annual IEEE Conference on Local Computer Networks.

[10]  Ittay Eyal,et al.  The Miner's Dilemma , 2014, 2015 IEEE Symposium on Security and Privacy.

[11]  Daniel R. Simon,et al.  Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack , 1991, CRYPTO.

[12]  Hideaki Goto,et al.  Easy-to-Deploy Wireless Mesh Network System with User Authentication and WLAN Roaming Features , 2017, IEICE Trans. Inf. Syst..

[13]  Gonzalo Joya,et al.  Peer selection in P2P wireless mesh networks: comparison of different strategies , 2015, Soft Comput..

[14]  Brahim Bensaou,et al.  Throughput optimization in wireless local networks with inter-AP interference via a joint-association control, rate control, and contention resolution , 2014, Ad Hoc Networks.

[15]  Lawrence Wai-Choong Wong,et al.  A Network Resource Management Framework for Wireless Mesh Networks , 2017, Wirel. Pers. Commun..

[16]  Leandros Tassiulas,et al.  Video-Aware Multicast Opportunistic Routing Over 802.11 Two-Hop Mesh Networks , 2017, IEEE Trans. Veh. Technol..

[17]  Abhishek Majumder,et al.  Implementation of enhanced forward pointer-based mobility management scheme for handling internet and intranet traffic in wireless mesh network , 2017, Telecommun. Syst..

[18]  Shen Noether,et al.  Ring Confidential Transactions , 2016, Ledger.

[19]  Hamed Shariffar SHA1 and SHA256 custom instruction design and characterization on Nios II processor , 2012 .

[20]  Aviv Zohar,et al.  Optimal Selfish Mining Strategies in Bitcoin , 2015, Financial Cryptography.

[21]  Hu Junru The improved elliptic curve digital signature algorithm , 2011, Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology.

[22]  Xun Wang,et al.  Review on mining data from multiple data sources , 2018, Pattern Recognit. Lett..

[23]  Hans Dobbertin,et al.  RIPEMD with two-round compress function is not collision-free , 1997, Journal of Cryptology.

[24]  Ethan Heilman,et al.  Eclipse Attacks on Bitcoin's Peer-to-Peer Network , 2015, USENIX Security Symposium.

[25]  Catherine H. Gebotys,et al.  Tailoring a Reconfigurable Platform to SHA-256 and HMAC through Custom Instructions and Peripherals , 2009, 2009 International Conference on Reconfigurable Computing and FPGAs.

[26]  Lawrence Wai-Choong Wong,et al.  Optimal Association in Wireless Mesh Networks , 2015, IEEE Transactions on Vehicular Technology.

[27]  Xiaoheng Deng,et al.  Performance Analysis for IEEE 802.11s Wireless Mesh Network in Smart Grid , 2017, Wirel. Pers. Commun..

[28]  Chao Yuan,et al.  Research on a New Signature Scheme on Blockchain , 2017, Secur. Commun. Networks.

[29]  Alfred Menezes,et al.  The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.

[30]  Manuel Blum,et al.  Noninteractive Zero-Knowledge , 1991, SIAM J. Comput..