Threshold key redistribution for dynamic change of authentication group in wireless mesh networks

Kan Yang, Xiaohua Jia, Bo Zhang, Zhongming Zheng

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

3 Citations (Scopus)

Abstract

Threshold User Authentication is widely used to provide distributed authentication service in Wireless Mesh Networks(WMNs). In a (t, n) threshold authentication scheme, secret authentication keys are shared among n mesh authentication servers (MAS) and any t out of n MASs can collaboratively provide the authentication service. The existing threshold authentication methods usually assume that MASs are static in the system. That is, t and n do not change after system initialization. However, in WMNs, MASs often join or leave the network freely. In this paper, we propose a novel threshold key redistribution protocol, aiming to cope with dynamic change of the authentication group. We also discuss the key redistribution protocol that can tolerate compromised MASs in the network. ©2010 IEEE.
Original languageEnglish
Title of host publicationGLOBECOM - IEEE Global Telecommunications Conference
DOIs
Publication statusPublished - 2010
Event53rd IEEE Global Communications Conference, GLOBECOM 2010 - Miami, FL, United States
Duration: 6 Dec 201010 Dec 2010

Conference

Conference53rd IEEE Global Communications Conference, GLOBECOM 2010
PlaceUnited States
CityMiami, FL
Period6/12/1010/12/10

Research Keywords

  • Security in wireless mesh networks
  • Threshold key redistribution
  • Threshold user authentication

Fingerprint

Dive into the research topics of 'Threshold key redistribution for dynamic change of authentication group in wireless mesh networks'. Together they form a unique fingerprint.

Cite this