Performance evaluation of different crl distribution schemes embedded in WMN authentication

0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Wireless Mesh Networks (WMNs) have emerged as a promising technology to provide low cost and scalable solutions for high speed Internet access and additional services. In hybrid WMNs, where mesh clients also act as relaying agents and form a mesh client network, it is important to provide users with an efficient anonymous and accountable authentication scheme. Accountability is required for the malicious users that are to be identified and revoked from the network access and related services. Promising revocation schemes are based on Certification Revocation Lists (CRLs). Since in hybrid WMNs mesh clients also authenticate other clients, distribution of these CRLs is an important task. In this paper, we propose and examine the performance of different distribution schemes of CRLs and analyze authentication performance in two scenarios: in one scenario all mesh routers and mesh clients obtain CRLs and in the second one, CRLs are held only by the mesh routers and mesh clients acting as relaying agents require CRL checking to be performed from the router in authenticating another client. © 2013 Springer-Verlag London.

Cite

CITATION STYLE

APA

Durahim, A. O., Yildirim, I. F., Savaş, E., & Levi, A. (2013). Performance evaluation of different crl distribution schemes embedded in WMN authentication. In Computer and Information Sciences III - 27th International Symposium on Computer and Information Sciences, ISCIS 2012 (pp. 333–342). Kluwer Academic Publishers. https://doi.org/10.1007/978-1-4471-4594-3_34

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free