Skip to main content
Article thumbnail
Location of Repository

Authentication in Multi-Hop Wireless Mesh Networks

By Ciscoaironet I Wirelessaccesspoint, Ciscoaironet I Wirelessaccesspoint, Ciscoaironet I Wirelessaccesspoint, Ciscoaironet I Wireles Acesspoint, Ciscoaironet I Wireles Acesspoint, Kaleemullah Khan and Muhammmad Akbar

Abstract

Abstract—Wireless Mesh Networks (WMNs) are an emerging technology for last-mile broadband access. In WMNs, similar to ad hoc networks, each user node operates not only as a host but also as a router. User packets are forwarded to and from an Internet-connected gateway in multi-hop fashion. The WMNs can be integrated with other networking technologies i.e. ad hoc networks, to implement a smooth network extension. The meshed topology provides good reliability and scalability, as well as low upfront investments. Despite the recent start-up surge in WMNs, much research remains to be done in standardizing the functional parameters of WMNs to fully exploit their full potential. An edifice of the security concerns of these networks is authentication of a new client joining an integrated ad hoc network and such a scenario will require execution of a multihop authentication technique. Our endeavor in this paper is to introduce a secure authentication technique, with light over-heads that can be conveniently implemented for the ad-hoc nodes forming clients of an integrated WMN, thus facilitating their inter-operability

Year: 2011
OAI identifier: oai:CiteSeerX.psu:10.1.1.193.3029
Provided by: CiteSeerX
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • http://citeseerx.ist.psu.edu/v... (external link)
  • http://www.waset.org/journals/... (external link)
  • Suggested articles


    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.