• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

Trust Based Authentication and Key Establishment for Secure Routing in WMN

Vol. 8, No.12, December 31, 2014
10.3837/tiis.2014.12.024, Download Paper (Free):

Abstract

In Wireless Mesh Networks (WMN), an authentication technique can be compromised due to the distributed network architecture, the broadcast nature of the wireless medium and dynamic network topology. Several vulnerabilities exist in different protocols for WMNs. Hence, in this paper, we propose trust based authentication and key establishment for secure routing in WMN. Initially, a trust model is designed based on Ant Colony Optimization (ACO) to exchange the trust information among the nodes. The routing table is utilized to select the destination nodes, for which the link information is updated and the route verification is performed. Based on the trust model, mutual authentication is applied. When a node moves from one operator to another for accessing the router, inter-authentication will be performed. When a node moves within the operator for accessing the router, then intraauthentication will be performed. During authentication, keys are established using identity based cryptography technique. By simulation results, we show that the proposed technique enhances the packet delivery ratio and resilience with reduced drop and overhead.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
G.Akilarasu and Dr.S.Mercy Shalinie, "Trust Based Authentication and Key Establishment for Secure Routing in WMN," KSII Transactions on Internet and Information Systems, vol. 8, no. 12, pp. 4661-4676, 2014. DOI: 10.3837/tiis.2014.12.024

[ACM Style]
G.Akilarasu, and Shalinie, D. 2014. Trust Based Authentication and Key Establishment for Secure Routing in WMN. KSII Transactions on Internet and Information Systems, 8, 12, (2014), 4661-4676. DOI: 10.3837/tiis.2014.12.024