A Secure and Light Weight Authentication and Key Establishment Framework for Wireless Mesh Network

The advancements in networking technology resulted in emergence of Wireless Mesh Networks (WMNs) on top of IEEE 802.11 standard to provide flexible and adaptive network architecture to next-generation wireless networks. Research proved that IEEE 802.11 is vulnerable to DoS and Man in the Middle attacks. Hence, WMN is also vulnerable to similar attacks. In this context, recently Somanath et al has provided an authentication framework for WMN and claimed that their framework is attack resistant. In this manuscript, after thorough evaluation of somanath et al authentication scheme, we have originated few inconsistencies and we will demonstrate that their scheme is vulnerable to replay and user impersonation attacks etc. As part of our contribution, we have developed a light weight authentication framework for WMN which is robust and attack resistant by preserving the merits of somanath et al framework.

[1]  Levente Buttyán,et al.  Fast certificate-based authentication scheme in multi-operator maintained wireless mesh networks , 2010, Comput. Commun..

[2]  Pin-Han Ho,et al.  TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks , 2008, IEEE Transactions on Wireless Communications.

[3]  Yuguang Fang,et al.  SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks , 2011, IEEE Transactions on Dependable and Secure Computing.

[4]  Somanath Tripathy,et al.  WAKE: Authentication and Key Establishment for Wireless Mesh Network , 2012, SNDS.

[5]  Muhammad Khurram Khan,et al.  Cryptanalysis and Improvement of Authentication and Key Agreement Protocols for Telecare Medicine Information Systems , 2014, Journal of Medical Systems.

[6]  Futai Zou,et al.  A Survey on Security in Wireless Mesh Networks , 2010 .

[7]  Chandra Sekhar Vorugunti,et al.  A Secure Biometric-Based User Authentication Scheme for Heterogeneous WSN , 2014, 2014 Fourth International Conference of Emerging Applications of Information Technology.

[8]  Uyen Trang Nguyen,et al.  Fast authentication for mobility support in wireless mesh networks , 2011, 2011 IEEE Wireless Communications and Networking Conference.

[9]  Dongho Won,et al.  Cryptanalysis and Improvement on Robust Three-Factor Remote User Authentication Scheme with Key Agreement for Multimedia System , 2014, IACR Cryptol. ePrint Arch..

[10]  Li Xu,et al.  Ticket-based handoff authentication for wireless mesh networks , 2014, Comput. Networks.

[11]  Jaydip Sen Secure and Privacy-Preserving Authentication Protocols for Wireless Mesh Networks , 2012, ArXiv.

[12]  Maryline Laurent-Maknavicius,et al.  An ID-based authentication scheme for the IEEE 802.11s Mesh Network , 2010, 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications.