1st International ICST Conference on Communications and Networking in China

Research Article

Authentication Method for 802.11S Infrastructure Mode

  • @INPROCEEDINGS{10.1109/CHINACOM.2006.344829,
        author={Xinghua  Li and Weidong  Yang and SangJae  Moon and Jianfeng  Ma},
        title={Authentication Method for 802.11S Infrastructure Mode},
        proceedings={1st International ICST Conference on Communications and Networking in China},
        publisher={IEEE},
        proceedings_a={CHINACOM},
        year={2007},
        month={4},
        keywords={},
        doi={10.1109/CHINACOM.2006.344829}
    }
    
  • Xinghua Li
    Weidong Yang
    SangJae Moon
    Jianfeng Ma
    Year: 2007
    Authentication Method for 802.11S Infrastructure Mode
    CHINACOM
    IEEE
    DOI: 10.1109/CHINACOM.2006.344829
Xinghua Li1,2,3,4, Weidong Yang1,2, SangJae Moon3,4, Jianfeng Ma1,2
  • 1: Key Laboratory of Computer Networks and Information Security (Ministry of
  • 2: Education), Xidian University, Xi'an 710071, China
  • 3: Mobile Network Security Technology Research Center, Kyungpook National
  • 4: University, Sankyuk-dong, Buk-ku, Daegu 702-701, Korea

Abstract

With the rapid development of the WLAN, the 802.11s mesh network is emerging. However, the security in the 802.11s mesh network is not well defined or specified, and there is no standard method to authenticate a mesh point that is creating a mesh link. In this paper, a solution is proposed for the authentication of mesh points in the infrastructure model. In this proposal, the 802.1X/EAP and neighbor graph is combined to realize fast mutual authentications between a new mesh point and each of its mesh links. Analysis shows that the computation and communication load of our scheme is greatly less than that of the scheme in J. Agre et al. (2005). At the same time, the simulation results indicate that the authentication latency of our scheme is less than that of the scheme in J. Agre et al. (2005).