Computer Science ›› 2010, Vol. 37 ›› Issue (2): 53-55.

Previous Articles     Next Articles

Efficient Roaming Authentication with Anonymity Protocol for Wireless Vehicle Mesh Networks

WU Xiu-qiang,MA Hua,ZHANG Wei-dong,PEI Qing-qi   

  • Online:2018-12-01 Published:2018-12-01

Abstract: Due to their own characteristics, wireless mesh networks arc facing more security challenges than traditional networks. Their security mechanism should take into account both the security and the application environment, Anonymous authentication and key negotiation, when users roam, are an elementary protocol in constructing a secure network system, and are the implementation foundation of the secure routing protocol .The user's certificated in wireless mesh networks , protection of identity information is very important, but the study of anonymous authentication and key nego- nation when users roami in wireless mesh networks was too little. Motivated by these concerns,on the enough consideration on the attack methods for wireless networks and the characteristics of wireless mesh networks, an efficient roaming authentication with anonymity protocol for wireless vehicle mesh networks was proposed, in which the ID based public key cryptography and Diffie-Hellman algorithm were adopted. Analysis shows that this protocol can be used to guarantee the security of wireless mesh networks, and at the same time, it can meet the special application environment of wireless vehicle mesh networks.

Key words: Mesh, Roaming, Anonymous authentication, Protocols, Privacy protection

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!