Abstract
Wireless Mesh Networks (WMNs) have emerged as a promising technology to provide low cost and scalable solutions for high speed Internet access and additional services. In hybrid WMNs, where mesh clients also act as relaying agents and form a mesh client network, it is important to provide users with an efficient anonymous and accountable authentication scheme. Accountability is required for the malicious users that are to be identified and revoked from the network access and related services. Promising revocation schemes are based on Certification Revocation Lists (CRLs). Since in hybrid WMNs mesh clients also authenticate other clients, distribution of these CRLs is an important task. In this paper, we propose and examine the performance of different distribution schemes of CRLs and analyze authentication performance in two scenarios: in one scenario all mesh routers and mesh clients obtain CRLs and in the second one, CRLs are held only by the mesh routers and mesh clients acting as relaying agents require CRL checking to be performed from the router in authenticating another client.
Erkay Savaş, and Ahmet Onur Durahim are supported by the Scientific and Technological Research Council of Turkey (TUBITAK) under Project number 105E089. Albert Levi and İsmail Fatih Yıldırım are supported by Turk Telekom under Grant Number 3014-01.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
This list is named as UserRL in A\(^2\)-MAKE.
References
Akyildiz, I.F., Wang, X., Wang, W.: Wireless mesh networks: a survey. Comput. Netw. 47(4), 445–487 (2005)
Durahim, A.O., Savaş, E.: A\(^{\text{2}}\)-MAKE: an efficient anonymous and accountable mutual authentication and key agreement protocol for WMNs. Ad Hoc Netw. 9(7), 1202–1220 (2011)
The ns-3 Network Simulator. http://www.nsnam.org. Accessed 02 March 2012
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag London
About this paper
Cite this paper
Durahim, A.O., Yıldırım, İ.F., Savaş, E., Levi, A. (2013). Performance Evaluation of Different CRL Distribution Schemes Embedded in WMN Authentication. In: Gelenbe, E., Lent, R. (eds) Computer and Information Sciences III. Springer, London. https://doi.org/10.1007/978-1-4471-4594-3_34
Download citation
DOI: https://doi.org/10.1007/978-1-4471-4594-3_34
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-4471-4593-6
Online ISBN: 978-1-4471-4594-3
eBook Packages: EngineeringEngineering (R0)