title   
  

A(2)-MAKE: An efficient anonymous and accountable mutual authentication and key agreement protocol for WMNs

Durahim, Onur Ahmet and Savaş, Erkay (2011) A(2)-MAKE: An efficient anonymous and accountable mutual authentication and key agreement protocol for WMNs. Ad Hoc Networks, 9 (7). pp. 1202-1220. ISSN 1570-8705

Full text not available from this repository.

Official URL: http://dx.doi.org/10.1016/j.adhoc.2011.01.008

Abstract

Multi-hop hybrid wireless mesh networks (WMNs) have recently attracted increasing attention and deployment. For easy acceptance and wide deployment of WMNs, security, privacy, and accountability issues have to be addressed by providing efficient, reliable, and scalable protocols. The fact that regular users, which may be resource-constrained wireless devices, are involved in routing activities highlights the need for efficiency and compactness. However, the said objectives, i.e., security, privacy, accountability, efficiency etc., are, most of the time, not compatible. So far no previous work has adequately reconciled these conflicting objectives in a practical framework. In this paper, we design and implement such a framework named as A(2)-MAKE, which is a collection of protocols. The framework provides an anonymous mutual authentication protocol whereby legitimate users can connect to network from anywhere without being identified or tracked unwillingly. No single party (or authority, network operator, etc.) can violate the privacy of a user, which is provided in our framework in the strongest sense. Our framework utilizes group signatures, where the private keys and corresponding credentials of the users are generated in a secure three-party protocol. User accountability is implemented via user identification and revocation protocols that can be executed by two semi-trusted authorities, one of which is the network operator. The assumptions about the trust level of the network operator are relaxed with respect to similar protocols. Our framework makes use of more efficient signature generation and verification algorithms in terms of computational complexity than their counterparts in literature, where signature size is almost the same as the shortest signatures proposed for similar purposes so far.

Item Type:Article
Uncontrolled Keywords:Network security; Wireless mesh networks; Privacy-aware authentication; Accountability; Cryptographic protocols
Subjects:T Technology > TK Electrical engineering. Electronics Nuclear engineering > TK5101-6720 Telecommunication
Q Science > QA Mathematics > QA075 Electronic computers. Computer science
ID Code:16643
Deposited By:Erkay Savaş
Deposited On:02 Aug 2011 11:38
Last Modified:02 Aug 2011 12:09

Repository Staff Only: item control page