A WMN anonymous access authentication system and method based on proxy ring signature

An access authentication and ring signature technology, applied in wireless communications, electrical components, security devices, etc., can solve the problems of high computational overhead, reduced applicability, and no consideration of user anonymity, so as to reduce authentication delay and ensure communication security. , the effect of preventing privacy leakage

Active Publication Date: 2018-10-23
NORTHEASTERN UNIV LIAONING
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The document "Efficient Authentication for Fast Handover in Wireless Mesh Networks" designed an efficient authentication scheme for WMN, and proposed a ticket-based identity authentication protocol. The authentication server does not need to participate in the handover authentication process, and the mobile user directly passes the mesh access point. Authentication, which effectively reduces the authentication delay, but does not consider the anonymity of the user during the access process; the document "Preserving Privacy in Mobile Communications: A Hybrid Method" proposes a WMN security authentication scheme based on EAP-TLS. Although this scheme provides relatively High security, two-way authentication, and robustness against malicious attacks, but the use of asymmetric cryptography makes the calculation overhead of the scheme larger, which cannot well meet the needs of WMN lightweight computing; the literature "Dynamic Distributed Authentication Scheme for Wireless Lan-based Mesh Networks” proposes a symmetric key establishment scheme based on hierarchical multivariate functions for WMN, which realizes fast mutual authentication and key pair establishment among entities in WMN. With the surge in the number of network users, the scheme’s Applicability is greatly reduced
[0004] It can be seen that among the above-mentioned authentication schemes, there are deficiencies in varying degrees in authentication delay and privacy protection of the access process, and none of them can well meet the needs of WMN secure and efficient access authentication.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A WMN anonymous access authentication system and method based on proxy ring signature
  • A WMN anonymous access authentication system and method based on proxy ring signature
  • A WMN anonymous access authentication system and method based on proxy ring signature

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The specific implementation manners of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0038] This embodiment is to apply the WMN anonymous access authentication system and method based on the proxy ring signature to the wireless MESH network access authentication link. In the specific implementation process, the proxy ring signature scheme is adopted to realize anonymous access authentication of users and fully protect the privacy of users. At the same time, a certificateless signature scheme is adopted to realize efficient switch authentication of users.

[0039] Such as figure 1 As shown, the WMN anonymous access authentication system based on proxy ring signature includes a trust center TR, two gateways (GW1 and GW2), multiple MESH routers and mobile clients, a gateway (Gateway, GW), and several underlying A Mesh Router (Mesh Route, MR) and several mobile client nodes (Mesh Client, MC) form a proxy ring signe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a WMN anonymous access authentication system and method based on a proxy ring signature. The system includes: a trust center, a gateway, a Mesh router, and a mobile client node; the method includes: the trust center generates public parameters; all legal entities in the WMN network Generate its own public-private key pair, and register its own public key to the trust center; the gateway generates the public-private key of the proxy ring signer set where it is located; when the mobile client node accesses the Mesh router in the foreign WMN network, it performs cross-proxy The access authentication of the ring signer set; when the mobile client node accesses a new Mesh router in the local WMN, the switching access authentication in the proxy ring signer set is performed. The invention is applied in the field of mobile Internet, applies the proxy ring signature technology providing privacy protection to the access authentication process, and applies the efficient certificateless signature to the switching authentication process, so as to achieve the purpose of ensuring communication security and privacy protection.

Description

technical field [0001] The invention belongs to the technical field of wireless network security, in particular to a WMN anonymous access authentication system and method based on a proxy ring signature. Background technique [0002] With the continuous development of mobile terminals, people's demand for wireless network services is increasing. In order to meet people's needs for convenient and fast connection to the network anytime, anywhere, the industry has paid more and more attention to the research of wireless network technology, and WMN is undoubtedly a wireless network research. an important technology in the WMN (wireless mesh network) is a wireless mesh network, which has the advantages of self-organization, automatic configuration, high scalability, low deployment cost, etc., and can be integrated with a variety of bandwidth wireless access technologies, especially suitable for broadband wireless backbone The internet. At the same time, it is precisely because ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06
CPCH04W12/06
Inventor 郭楠王恺璇王权琦高天寒
Owner NORTHEASTERN UNIV LIAONING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products