Fast Certificate-based Authentication Scheme in Multi-operator maintained Wireless Mesh Networks (Articolo in rivista)

Type
Label
  • Fast Certificate-based Authentication Scheme in Multi-operator maintained Wireless Mesh Networks (Articolo in rivista) (literal)
Anno
  • 2010-01-01T00:00:00+01:00 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#doi
  • 10.1016/j.comcom.2010.01.014 (literal)
Alternative label
  • Levente Buttyan; Laszlo Dora; Fabio Martinelli; Marinella Petrocchi (2010)
    Fast Certificate-based Authentication Scheme in Multi-operator maintained Wireless Mesh Networks
    in Computer communications
    (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#autori
  • Levente Buttyan; Laszlo Dora; Fabio Martinelli; Marinella Petrocchi (literal)
Pagina inizio
  • 907 (literal)
Pagina fine
  • 922 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#numeroVolume
  • 33 (literal)
Rivista
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#note
  • In: Computer Communications, vol. 33 (8) pp. 907 - 922. Elsevier, 2010. (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#numeroFascicolo
  • 8 (literal)
Note
  • ISI Web of Science (WOS) (literal)
  • DBLP (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#affiliazioni
  • Martinelli and Petrocchi: CNR-IIT, Pisa Buttyan and Dora: CrySyS, Budapest University of Technology and Economics, Hungary (literal)
Titolo
  • Fast Certificate-based Authentication Scheme in Multi-operator maintained Wireless Mesh Networks (literal)
Abstract
  • In this paper, we consider QoS aware mesh networks that are maintained by multiple operators and they cooperate in the provision of networking services to the mesh clients. In order to support mobile users and seamless handover between the access points, the authentication delay has to be reduced. Many proposed fast authentication schemes rely on trust models that are not appropriate in a multi-operator environment. In this paper, we propose two certificate-based authentication schemes such that the authentication is performed locally between the access point and the mesh client. We assume that the access point is always a constrained device, and we propose different mechanisms for mesh clients with different computational performance. For constrained devices, we propose a mechanism where weak keys are used for digital signatures to decrease the latency of the authentication. The authenticity of the weak keys are provided by short-term certificates issued by the owner of the key. The short-term certificate has the digital signature generated by the owner's long-term key. We prove formally that the use of our weak key mechanism on the mesh client side is as secure as the use of some stronger keys. We perform a detailed performance evaluation on our proof-of-concept implementation, and we also compare our solution to the current standard methods (literal)
Prodotto di
Autore CNR
Insieme di parole chiave

Incoming links:


Prodotto
Autore CNR di
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#rivistaDi
Insieme di parole chiave di
data.CNR.it