Advertisement

Secured Authentication and Signature Routing Protocol for WMN (SASR)

  • Geetanjali Rathee
  • Hemraj Saini
  • Satya Prakash Ghrera
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 380)

Abstract

Security provisions are a significant influence in the conception of security system for wireless mesh networks (WMNs). It is therefore necessary to guard the identities of individual clients to avoid personal privacy concerns. Numerous susceptibilities exist in different protocols for WMNs (i.e. Overhead, storage, availability of resources). These ambiguities can be discussed by probable attackers to bring down the network performance. In this manuscript, we offer a secure authentication and signature routing protocol (SASR) based on diffie-helman model and threshold signature for reducing response time and improve the security at mesh node. The proposed approach validates the certification of the mesh nodes effectively and paves the path for secure communication. Since the protocol uses Diffie-Helman key mode and threshold signature, very little key is enough for obtaining the needed protection. This thins out the bandwidth allocation for key, so the security constraints will not move the bandwidth by any means, which is an additional advantage over other systems.

Keywords

Wireless mesh network Diffie-Helman SASR Authentication Threshold Security 

References

  1. 1.
    Ferdous, R., Muthukkumarasamy, V., Sithirasenan, E.: Trust-based cluster head selection algorithm for mobile ad hoc networks. In: Trust, Security and Privacy in Computing and Communications (TrustCom), IEEE 10th International Conference (2011)Google Scholar
  2. 2.
    Smith, T.F., Waterman, M.S.: Identification of common molecular subsequences. J. Mol. Biol. 147 (1981)Google Scholar
  3. 3.
    Mishra, A., Arbaugh, W.A.: An Initial Security Analysis of the IEEE 802.1X Standard. Computer Science Department Technical Report CS-TR-4328, pp. 5–197, University of Maryland, USA, February 2002Google Scholar
  4. 4.
    Kassab, M., Belghith, A., Bonnin, J.-M., Sassi, S.: Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks. In: Proceedings of the 1st ACM Workshop on Wireless Multimedia Networking and Performance Modeling (WMuNeP), pp. 46–53. Montreal, Canada, October 2005Google Scholar
  5. 5.
    Ben Salem, N., Hubaux, J.-P.: Securing wireless mesh networks. In: IEEE Wireless Commun. 13, 50–55 (2006)Google Scholar
  6. 6.
    Cheikhrouhou, O., Maknavicius, M., Chaouchi, H.: Security architecture in a multi-hop mesh network. In: Proceedings of the 5th Conference on Security Architecture Research (SAR), Seignosse-Landes, France, June 2006Google Scholar
  7. 7.
    Zhu, S., et al.: A light-weight hop-by-hop access protocol. In: Distributed Computing Systems Workshops, 2003. Proceedings 23rd International Conference on IEEE, pp. 749–755 (2003)Google Scholar
  8. 8.
    Prasad, N.R., Alam, M., Ruggieri, M.: Light-weight AAA infrastructure for mobility support across heterogeneous networks. Wireless Pers. Commun. 29, 205–219 (2004)Google Scholar
  9. 9.
    Moustafa, H., Zhang, et al.: Providing authentication, trust, and privacy in wireless mesh networks. In: Security in Wireless Mesh Networks, pp. 261–295. CRC Press, USA (2007)Google Scholar
  10. 10.
    Fantacci, R., Maccari, L., Pecorella, T., Frosali, F.: A secure and performant token-based authentication for infrastructure and mesh 802.1X networks. In: Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM’06), Poster Paper, Barcelona, Spain, April 2006Google Scholar
  11. 11.
    Anil Kumar, V., Praveen Kumar Rao, K., Prasad, E., Gowtham Kumar, N.: Clustering based certificate revocation in mobile ad hoc networks. Int. J. Comput. Sci. Manag. Res. 2, (2013)Google Scholar
  12. 12.
    Park, Y., Park, Y., Moon, S.: Anonymous cluster-based MANETs with threshold signature. Hindawi Publ. Corporation Int. J. Distrib. Sens. Netw. (2013)Google Scholar
  13. 13.
    Liu, W., Nishiyama, H., Ansari, N., Yang, J., Kato, N.: Cluster-based certificate revocation with vindication capability for mobile ad hoc networks. In: IEEE Trans. Parallel Distrib. Syst. (2013)Google Scholar
  14. 14.
    Yu, Y., Zhang, L.:A secure clustering algorithm in mobile ad hoc networks. IPCSIT 29, (2012)Google Scholar

Copyright information

© Springer India 2016

Authors and Affiliations

  • Geetanjali Rathee
    • 1
  • Hemraj Saini
    • 1
  • Satya Prakash Ghrera
    • 1
  1. 1.Computer Science DepartmentJaypee University of Information TechnologyWaknaghat, SolanIndia

Personalised recommendations