http://www.cnr.it/ontology/cnr/individuo/prodotto/ID30036
Fast Certificate-based Authentication Scheme in Multi-operator maintained Wireless Mesh Networks (Articolo in rivista)
- Type
- Label
- Fast Certificate-based Authentication Scheme in Multi-operator maintained Wireless Mesh Networks (Articolo in rivista) (literal)
- Anno
- 2010-01-01T00:00:00+01:00 (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#doi
- 10.1016/j.comcom.2010.01.014 (literal)
- Alternative label
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#autori
- Levente Buttyan; Laszlo Dora; Fabio Martinelli; Marinella Petrocchi (literal)
- Pagina inizio
- Pagina fine
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#numeroVolume
- Rivista
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#note
- In: Computer Communications, vol. 33 (8) pp. 907 - 922. Elsevier, 2010. (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#numeroFascicolo
- Note
- ISI Web of Science (WOS) (literal)
- DBLP (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#affiliazioni
- Martinelli and Petrocchi: CNR-IIT, Pisa
Buttyan and Dora: CrySyS, Budapest University of Technology and Economics, Hungary (literal)
- Titolo
- Fast Certificate-based Authentication Scheme in Multi-operator maintained Wireless Mesh Networks (literal)
- Abstract
- In this paper, we consider QoS aware mesh networks that are maintained by multiple operators and they cooperate in the provision of networking services to the mesh clients. In order to support mobile users and seamless handover between the access points, the authentication delay has to be reduced. Many proposed fast authentication schemes rely on trust models that are not appropriate in a multi-operator environment. In this paper, we propose two certificate-based authentication schemes such that the authentication is performed locally between the access point and the mesh client. We assume that the access point is always a constrained device, and we propose different mechanisms for mesh clients with different computational performance. For constrained devices, we propose a mechanism where weak keys are used for digital signatures to decrease the latency of the authentication. The authenticity of the weak keys are provided by short-term certificates issued by the owner of the key. The short-term certificate has the digital signature generated by the owner's long-term key. We prove formally that the use of our weak key mechanism on the mesh client side is as secure as the use of some stronger keys. We perform a detailed performance evaluation on our proof-of-concept implementation, and we also compare our solution to the current standard methods (literal)
- Prodotto di
- Autore CNR
- Insieme di parole chiave
Incoming links:
- Prodotto
- Autore CNR di
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#rivistaDi
- Insieme di parole chiave di