{"title":"Anonymous Authentication Scheme Based on Proxy Group Signature for Wireless MESH Network","authors":"Tianhan Gao, Qidi Miao, Nan Guo","doi":"10.1109/IMIS.2014.78","DOIUrl":null,"url":null,"abstract":"Wireless MESH Network (WMN) has become an important technology and has been widely deployed due to its simplicity, low cost, and flexibility in implementation. WMN is a wireless multi-hop network, therefore the privacy protection is extremely important. This paper proposes an anonymous access authentication scheme based on the proxy group signature. The scheme completely protects user's privacy during authentication. In order to improve the efficiency of our scheme, we further adopt certificate-based signature mechanism to design a highly efficient handover authentication protocol. Finally, we show the security analysis of our scheme.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IMIS.2014.78","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
Wireless MESH Network (WMN) has become an important technology and has been widely deployed due to its simplicity, low cost, and flexibility in implementation. WMN is a wireless multi-hop network, therefore the privacy protection is extremely important. This paper proposes an anonymous access authentication scheme based on the proxy group signature. The scheme completely protects user's privacy during authentication. In order to improve the efficiency of our scheme, we further adopt certificate-based signature mechanism to design a highly efficient handover authentication protocol. Finally, we show the security analysis of our scheme.