Skip to main content

Design and Implementation of a Simulation Environment for the Evaluation of Authentication Protocols in IEEE 802.11s Networks

  • Conference paper

Abstract

Mesh technology presents a great deviation in the field of wireless networks thanks to its assets brought in the level of mobility, the quality of services and distribution of radios resources. Due to its importance, a working group was formed in IEEE organization in order to work out a standard for the Mesh networks under the reference IEEE 802.11s. Consequently, a whole of tasks remain in the course of research such as security. That allows the appearance of several solutions and protocols suggested by the researchers’ community in the literature. However, the existing simulators do not contain yet complete modules which allow studying this network. To remedy these problems, we thought of developing an environment of simulation for the evaluation of the authentication protocols for the IEEE 802.11s networks. This tool allows the easy development and the integration of new modules and thereafter its performances evaluation by providing appropriate measurements.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. NS-2, The Network Simulator, http://www.isi.edu/nsnam/ns

  2. The ns-3 network simulator, http://www.nsnam.org/

  3. Andreev, K., Boyko, P.: IEEE 802.11s Mesh Networking NS-3 Model

    Google Scholar 

  4. Catoio, G., Cibot, L., Laloux, M.: Etendre dynamiquement la couverture d’un réseau Mesh (2006/2007)

    Google Scholar 

  5. Faccin, S.M., Wijting, C., Kneckt, J., Damle, A.: Mesh wlan networks: concept and system design. IEEE Wireless Communications (April 2006)

    Google Scholar 

  6. Camp, J.D., Knightly, E.W.: The IEEE 802.11s Extended Service Set Mesh Networking Standard

    Google Scholar 

  7. IEEE P802.11s/D0.01 Draft Amendment to Standard for Information Technology-Telecommunications and Information Exchange Between Systems - LAN/MAN Specific Requirements-Part 11: Wireless Medium Access Control (MAC) and physical layer (PHY) specifications: Amendment: ESS Mesh Networking (March 2008)

    Google Scholar 

  8. Qiu, L., Bahl, P., Rao, A., Zhou, L.: Troubleshooting Wireless Mesh Networks

    Google Scholar 

  9. Holzner, S.: Total Java, Editions Eyrolles (2001)

    Google Scholar 

  10. Ajib, W.: Gestion de transmission d’un flux temporaire de donnés dans un réseau radio mobile d’accès TDMA. Thesis, ENST Paris (2000)

    Google Scholar 

  11. Wai, F.H., Ye, Y.N., James, N.H.: Intrusion Detection in wireless Ad Hoc networks. Introduction to wmobile Computing Technical Report CS4274

    Google Scholar 

  12. Daly, I., Zarai, F., Kamoun, L.: Secure Wireless Mobility Management. In: IEEE 17th International Conference on Telecommunications, ICT 2010 (2010)

    Google Scholar 

  13. Huang, D., Lin, P., Gan, C., Jeng, J.: A Mobility Management Mechanism using Location Cache for Wireless Mesh Network. In: QShine 2006, Waterloo, Ontario, Canada, August 1979. ACM (2006)

    Google Scholar 

  14. Khan, K., Akbar, M.: Authentication in Multi-Hop Wireless Mesh Networks. Proceedings of World Academy of Science, Engineering and Technology 16 (November 2006) ISSN 1307-6884

    Google Scholar 

  15. Izquierdo, A., Golmie, N., Hoeper, K., Chen, L.: Using the EAP Framework for Fast Media Independent Handover Authentication. National Institute of Standards and Technology, USA (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Daly, I., Zarai, F., Kamoun, L. (2012). Design and Implementation of a Simulation Environment for the Evaluation of Authentication Protocols in IEEE 802.11s Networks. In: Del Ser, J., et al. Mobile Lightweight Wireless Systems. Mobilight 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 81. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29479-2_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29479-2_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29478-5

  • Online ISBN: 978-3-642-29479-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics