Abstract
Security provisions are a significant influence in the conception of security system for wireless mesh networks (WMNs). It is therefore necessary to guard the identities of individual clients to avoid personal privacy concerns. Numerous susceptibilities exist in different protocols for WMNs (i.e. Overhead, storage, availability of resources). These ambiguities can be discussed by probable attackers to bring down the network performance. In this manuscript, we offer a secure authentication and signature routing protocol (SASR) based on diffie-helman model and threshold signature for reducing response time and improve the security at mesh node. The proposed approach validates the certification of the mesh nodes effectively and paves the path for secure communication. Since the protocol uses Diffie-Helman key mode and threshold signature, very little key is enough for obtaining the needed protection. This thins out the bandwidth allocation for key, so the security constraints will not move the bandwidth by any means, which is an additional advantage over other systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ferdous, R., Muthukkumarasamy, V., Sithirasenan, E.: Trust-based cluster head selection algorithm for mobile ad hoc networks. In: Trust, Security and Privacy in Computing and Communications (TrustCom), IEEE 10th International Conference (2011)
Smith, T.F., Waterman, M.S.: Identification of common molecular subsequences. J. Mol. Biol. 147 (1981)
Mishra, A., Arbaugh, W.A.: An Initial Security Analysis of the IEEE 802.1X Standard. Computer Science Department Technical Report CS-TR-4328, pp. 5–197, University of Maryland, USA, February 2002
Kassab, M., Belghith, A., Bonnin, J.-M., Sassi, S.: Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks. In: Proceedings of the 1st ACM Workshop on Wireless Multimedia Networking and Performance Modeling (WMuNeP), pp. 46–53. Montreal, Canada, October 2005
Ben Salem, N., Hubaux, J.-P.: Securing wireless mesh networks. In: IEEE Wireless Commun. 13, 50–55 (2006)
Cheikhrouhou, O., Maknavicius, M., Chaouchi, H.: Security architecture in a multi-hop mesh network. In: Proceedings of the 5th Conference on Security Architecture Research (SAR), Seignosse-Landes, France, June 2006
Zhu, S., et al.: A light-weight hop-by-hop access protocol. In: Distributed Computing Systems Workshops, 2003. Proceedings 23rd International Conference on IEEE, pp. 749–755 (2003)
Prasad, N.R., Alam, M., Ruggieri, M.: Light-weight AAA infrastructure for mobility support across heterogeneous networks. Wireless Pers. Commun. 29, 205–219 (2004)
Moustafa, H., Zhang, et al.: Providing authentication, trust, and privacy in wireless mesh networks. In: Security in Wireless Mesh Networks, pp. 261–295. CRC Press, USA (2007)
Fantacci, R., Maccari, L., Pecorella, T., Frosali, F.: A secure and performant token-based authentication for infrastructure and mesh 802.1X networks. In: Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM’06), Poster Paper, Barcelona, Spain, April 2006
Anil Kumar, V., Praveen Kumar Rao, K., Prasad, E., Gowtham Kumar, N.: Clustering based certificate revocation in mobile ad hoc networks. Int. J. Comput. Sci. Manag. Res. 2, (2013)
Park, Y., Park, Y., Moon, S.: Anonymous cluster-based MANETs with threshold signature. Hindawi Publ. Corporation Int. J. Distrib. Sens. Netw. (2013)
Liu, W., Nishiyama, H., Ansari, N., Yang, J., Kato, N.: Cluster-based certificate revocation with vindication capability for mobile ad hoc networks. In: IEEE Trans. Parallel Distrib. Syst. (2013)
Yu, Y., Zhang, L.:A secure clustering algorithm in mobile ad hoc networks. IPCSIT 29, (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer India
About this paper
Cite this paper
Rathee, G., Saini, H., Ghrera, S.P. (2016). Secured Authentication and Signature Routing Protocol for WMN (SASR). In: Satapathy, S., Raju, K., Mandal, J., Bhateja, V. (eds) Proceedings of the Second International Conference on Computer and Communication Technologies. Advances in Intelligent Systems and Computing, vol 380. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2523-2_31
Download citation
DOI: https://doi.org/10.1007/978-81-322-2523-2_31
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2522-5
Online ISBN: 978-81-322-2523-2
eBook Packages: EngineeringEngineering (R0)