Skip to main content

Secured Authentication and Signature Routing Protocol for WMN (SASR)

  • Conference paper
  • First Online:
Proceedings of the Second International Conference on Computer and Communication Technologies

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 380))

Abstract

Security provisions are a significant influence in the conception of security system for wireless mesh networks (WMNs). It is therefore necessary to guard the identities of individual clients to avoid personal privacy concerns. Numerous susceptibilities exist in different protocols for WMNs (i.e. Overhead, storage, availability of resources). These ambiguities can be discussed by probable attackers to bring down the network performance. In this manuscript, we offer a secure authentication and signature routing protocol (SASR) based on diffie-helman model and threshold signature for reducing response time and improve the security at mesh node. The proposed approach validates the certification of the mesh nodes effectively and paves the path for secure communication. Since the protocol uses Diffie-Helman key mode and threshold signature, very little key is enough for obtaining the needed protection. This thins out the bandwidth allocation for key, so the security constraints will not move the bandwidth by any means, which is an additional advantage over other systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ferdous, R., Muthukkumarasamy, V., Sithirasenan, E.: Trust-based cluster head selection algorithm for mobile ad hoc networks. In: Trust, Security and Privacy in Computing and Communications (TrustCom), IEEE 10th International Conference (2011)

    Google Scholar 

  2. Smith, T.F., Waterman, M.S.: Identification of common molecular subsequences. J. Mol. Biol. 147 (1981)

    Google Scholar 

  3. Mishra, A., Arbaugh, W.A.: An Initial Security Analysis of the IEEE 802.1X Standard. Computer Science Department Technical Report CS-TR-4328, pp. 5–197, University of Maryland, USA, February 2002

    Google Scholar 

  4. Kassab, M., Belghith, A., Bonnin, J.-M., Sassi, S.: Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks. In: Proceedings of the 1st ACM Workshop on Wireless Multimedia Networking and Performance Modeling (WMuNeP), pp. 46–53. Montreal, Canada, October 2005

    Google Scholar 

  5. Ben Salem, N., Hubaux, J.-P.: Securing wireless mesh networks. In: IEEE Wireless Commun. 13, 50–55 (2006)

    Google Scholar 

  6. Cheikhrouhou, O., Maknavicius, M., Chaouchi, H.: Security architecture in a multi-hop mesh network. In: Proceedings of the 5th Conference on Security Architecture Research (SAR), Seignosse-Landes, France, June 2006

    Google Scholar 

  7. Zhu, S., et al.: A light-weight hop-by-hop access protocol. In: Distributed Computing Systems Workshops, 2003. Proceedings 23rd International Conference on IEEE, pp. 749–755 (2003)

    Google Scholar 

  8. Prasad, N.R., Alam, M., Ruggieri, M.: Light-weight AAA infrastructure for mobility support across heterogeneous networks. Wireless Pers. Commun. 29, 205–219 (2004)

    Google Scholar 

  9. Moustafa, H., Zhang, et al.: Providing authentication, trust, and privacy in wireless mesh networks. In: Security in Wireless Mesh Networks, pp. 261–295. CRC Press, USA (2007)

    Google Scholar 

  10. Fantacci, R., Maccari, L., Pecorella, T., Frosali, F.: A secure and performant token-based authentication for infrastructure and mesh 802.1X networks. In: Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM’06), Poster Paper, Barcelona, Spain, April 2006

    Google Scholar 

  11. Anil Kumar, V., Praveen Kumar Rao, K., Prasad, E., Gowtham Kumar, N.: Clustering based certificate revocation in mobile ad hoc networks. Int. J. Comput. Sci. Manag. Res. 2, (2013)

    Google Scholar 

  12. Park, Y., Park, Y., Moon, S.: Anonymous cluster-based MANETs with threshold signature. Hindawi Publ. Corporation Int. J. Distrib. Sens. Netw. (2013)

    Google Scholar 

  13. Liu, W., Nishiyama, H., Ansari, N., Yang, J., Kato, N.: Cluster-based certificate revocation with vindication capability for mobile ad hoc networks. In: IEEE Trans. Parallel Distrib. Syst. (2013)

    Google Scholar 

  14. Yu, Y., Zhang, L.:A secure clustering algorithm in mobile ad hoc networks. IPCSIT 29, (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Geetanjali Rathee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer India

About this paper

Cite this paper

Rathee, G., Saini, H., Ghrera, S.P. (2016). Secured Authentication and Signature Routing Protocol for WMN (SASR). In: Satapathy, S., Raju, K., Mandal, J., Bhateja, V. (eds) Proceedings of the Second International Conference on Computer and Communication Technologies. Advances in Intelligent Systems and Computing, vol 380. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2523-2_31

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2523-2_31

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2522-5

  • Online ISBN: 978-81-322-2523-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics