Title: Secure handoff technique with reduced authentication delay in wireless mesh network

Authors: Geetanjali Rathee; Hemraj Saini

Addresses: Department of Computer Science and Engineering, Jaypee University of Information Technology, Waknaghat, Solan – 173234, Himachal Pradesh, India ' Department of Computer Science and Engineering, Jaypee University of Information Technology, Waknaghat, Solan – 173234, Himachal Pradesh, India

Abstract: The aim of manuscript is to propose a secure handoff procedure by generating the tickets for the mesh clients which are divided into different zones of mesh routers according to their communication range. An authentication server looks over the entire network after a specific interval of time and is responsible for generating and updating the corresponding tickets of clients according to their zonal routers range. Whenever a mesh client enters into the range of another domain, to access the services from foreign mesh routers, roaming client has to prove its authenticity to the corresponding zonal router. Each mesh router stores the ticket of its zonal mesh client issued from authentication server and validates the roaming client by matching the ticket. The proposed mechanism reduces the issue of storage overhead and security threats at mesh client as all the tickets are stored in authentication server database and are issued upon the request. The proposed technique is validated over authentication delay and different probabilistic scenarios of authentication and is proved legitimate by discussing an empirical study against reported literature.

Keywords: wireless mesh network; WMN; secure handoff; authentication; security threats; network delay; storage overhead; ticket-based authentication; false authentication; node mobility; authentication delay.

DOI: 10.1504/IJAIP.2019.099948

International Journal of Advanced Intelligence Paradigms, 2019 Vol.13 No.1/2, pp.130 - 154

Received: 04 Aug 2016
Accepted: 09 Nov 2016

Published online: 29 May 2019 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article