Article Preview
TopThe transmit nature of communication depends on the median nodes for multi-hop conduction which occurs various security vulnerabilities in wireless mesh networks. In WMN, authentication is endorsed in two transmitting groups (either a set of MCs or MR) to recognize the legitimacy.
Symmetric and public key cryptosystems are the two ways to provide authentication in WMN. GSM networks used symmetric cryptosystem and provide mutual authentication between VLR (Visited Location Register) and mobile devices (Tang & Wu, 2008). However, the scheme may suffer from DOS attack at HLR and cause long latency in multi hop WMN. Public key cryptosystem is used by EAP standard provide an authentication infrastructure between servers and clients. The methods of Public key cryptosystem are quite complex and lacks the ability to meet the requirement for MC’s. In order to reduce authentication delay in WMN, a number of schemes have been proposed in the literature. In (Aziz and Diffie, 1994) Aboba pointed out that 50ms in video conferencing and 150ms in streaming media must be ensured to provide a quality user experience. But every EAP based 802.1x limits the authentication delay min of 1000ms and 250ms during fast resume mode. Akbar and khan (Daly, Zarai & Kamoun et al., 2011) proposed a multi-hop authentication scheme which is based on EAP-TTLS (Tunneled Transport layer security). In this the minimum authentication delay is achieved up to 250ms. Further Lee et. Al. (I. Lee et al., 2007) proposed a distributed authentication method in which several trusted nodes are distributed among multiple domains of WMN. ID based cryptography is proposed by Zhang et. Al. (Y. Zhang et al., 2007) give a novel user broker operator trust model. All these approaches are available for single hop authentication. He, Joshi, Agrawal et al. (He, Joshi, Agrawal et al., 2010) proposed a de-centralized generation mechanism and provide multi-hop authenticity using symmetric polynomial based key generation. Although the authors are able to reduce in average authentication delay up to 100ms but suffers from other drawbacks i.e. DoS attack, computational overhead, passive eavesdrop etc. Authentication delay in multi hop scenario is quite difficult because messages have to travel multiple hops between source and destination. Thus, the requirement of QoS and security services, a fast and reliable authentication schemes need to be designed.
In this paper, ECDH (Lederer, Mader, Koschuch et al., 2009) mechanism is analyzed over WMN which provide the authentication between source and destination without involvement of intermediate nodes and reduce authentication delay at maximum level.