Security authentication and an undeniable billing protocol for WMNs

  • Ji Qi*
  • , Yi Zhao
  • , Xingming Wang
  • , Jaeho Choi
  • *Corresponding author for this work

Research output: Contribution to conferenceConference paperpeer-review

Abstract

Wireless mesh networks (WMNs) are drawing attention for commercial applications. Service should be uninterrupted when roaming from one domain to another, security should be maintained, and billing should be accurate. However, conventional authentication and billing methods have drawbacks such as coordination between the home domain and foreign domains and the connectivity between them. In this paper, we first present a re-authentication method which enables a mobile mesh node to be authenticated by a foreign domain which may not be directly connected to the home domain. Even though the current foreign domain does not have connectivity to the home domain, it can consult one of the nearest foreign domains that has been visited by the mobile mesh node. In addition, we use the hash chain to provide correct billing for both users and service providers.

Original languageEnglish
Title of host publicationProceedings - 2010 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2010
Pages266-269
Number of pages4
DOIs
StatePublished - 2010
Event2nd International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2010 - Huangshan, China
Duration: 2010.10.102010.10.12

Publication series

NameProceedings - 2010 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2010

Conference

Conference2nd International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2010
Country/TerritoryChina
CityHuangshan
Period10.10.1010.10.12

Keywords

  • Billing protocol
  • Security authentication protocol
  • Wireless mesh networks

Quacquarelli Symonds(QS) Subject Topics

  • Computer Science & Information Systems
  • Data Science

Fingerprint

Dive into the research topics of 'Security authentication and an undeniable billing protocol for WMNs'. Together they form a unique fingerprint.

Cite this