عنوان فارسی مقاله: تأیید اعتبار توزیع شده در شبکه های مش بی سیم از طریق Kerberos Tickets


عنوان انگلیسی مقاله:

Distributed Authentication in Wireless Mesh Networks Through Kerberos Tickets






 

فهرست مطالب

Distributed Authentication in Wireless Mesh Networks Through Kerberos Tickets

Draft History

Problem and motivation

Requirements

Kerberos Extension Solution Proposal 1/2

Potential Use-Cases

Next Step




بخشی از مقاله

Kerberos Extension Solution Proposal 2/2

o Shared secrets distribution mean should not compromise the security of the whole network:

– If shared secrets are required by each mesh node at each time interval, this would generate lot of traffic during the communication with the KDC.

– If shared secrets for future time intervals are pre-generated by the KDC and given in batch to each user, this would optimize traffic, but if a node is compromised at an interval of time, all the shared secrets would be known and the network would be compromised.

o The KDC sends to each mesh node the current interval shared secret and the pre-generated ones for the future, while each pre-generated shared secret is encrypted with a key corresponding to its related time interval. 

– This encryption key should be sent to each mesh node in the corresponding time interval either through Kerberos protocol or through a multicast routing protocol.

o Group keys can be also considered allowing 

– To have a shared secret for each group of mesh nodes (Mesh nodes sharing the same group key are nodes sharing some common characteristics “making a cluster, hierarchal group keys for example, …” ). 

– Each mesh node participate to more than one group and hence to have several group keys.

– If one group key is compromised it could be deleted by the KDC.







 

کلمات کلیدی: 

Distributed User Authentication in Wireless Mesh Networks https://pdfs.semanticscholar.org/cc2a/0b7c2fe74da82f04aba8e39b512b5daf760f.pdf by G Chaddoud - ‎Related articles Distributed User Authentication in Wireless Mesh Networks. Dr. Ghassan Chaddoud. *. Abstract. Wireless Mesh Networks, WMNs, are foreseen to be an ... Dynamic Distributed Authentication Scheme for Wireless LAN-Based ... link.springer.com/chapter/10.1007/978-3-540-89524-4_64 by I Lee - ‎2007 - ‎Cited by 11 - ‎Related articles Due to the characteristic of distributed environment, Wireless Mesh Networks(WMNs) need a new authentication scheme which allows multi-hop communication. [PDF]Authentication and Key Management in Wireless Mesh Network www.mitpublications.org/yellow_images/1361441515_logo_Untitled3.pdf by S Agarwal - ‎Related articles mesh network security are authentication, authorization and accounting. 2. Authentication ... distributed authentication is the continuous discovery and. An Anonymous Authentication and Communication Protocol for ... - arXiv https://arxiv.org/pdf/1107.5538 by J Sen - ‎2011 - ‎Cited by 2 - ‎Related articles WMN. The security protocol ensures secure authentication and encryption in ... Keywords: Wireless mesh network (WMN), user anonymity, security, authen- tication ... cope with this problem, proactive key distribution has been proposed [5, 6]. Dynamic Distributed Authentication Scheme for Wireless LAN-Based ... www.springerlink.com/index/D0X45057G8502633.pdf by I Lee - ‎2008 - ‎Cited by 11 - ‎Related articles on mesh points, thus enables the secure and easy deployment of WMNs. Keywords: Wireless Mesh network, Distributed authentication, WLAN. 1 Introduction. A New Ticket-Based Authentication Mechanism for Fast Handover in ... journals.plos.org/plosone/article?id=10.1371/journal.pone.0155064 by YM Lai - ‎2016 - ‎Cited by 3 - ‎Related articles May 12, 2016 - This is an open access article distributed under the terms of the Creative ... The wireless mesh network (WMN) is one of the best-known ... Efficient Distributed Authentication Method with ... - ACM Digital Library dl.acm.org/citation.cfm?id=2928950 by I Lee - ‎2007 - ‎Cited by 3 - ‎Related articles Mar 1, 2007 - Wireless mesh networks(WMN)' distributed and dynamic characteristic needs an distributed authentication scheme which supports the mobility ...