Abstract
As Wireless Mesh Network (WMN) is deliberated as a key technology in today’s networking era, security during designing of such system plays a significant role. A number of techniques (i.e. PANA, LHAP) have been proposed by several researchers in order to provide the security, but leads to certain vulnerability i.e. computational overhead, network congestion and encryption/decryption timing delay. In order to overcome against such drawbacks, this manuscript gives a novel technique based on homomorphic encryption (HE). Homomorphic encryption is a technique employed to heighten the security using algebraic operations without increasing the computational overhead. The suggested technique is evaluated against encryption/decryption parameter and proves the efficiency in comparison of existing protocols.
References
Akyildiz, Ian F., and Xudong Wang. A survey on wireless mesh networks. In; IEEE conference on Communications Magazine, 43(9); 2005.
A. A. Franklin and C. S. R. Murthy. An introduction to wireless mesh networks. Security in Wireless Mesh Networks (book chapter), CRC Press, USA; 2007.
Ben Salem, N. & Hubaux, J.-P.: Securing Wireless Mesh Networks. In:, IEEE Wireless Communication, 13(2), pp. 50–55, 2006.
Campista, Miguel Elias M., et al. “Routing metrics and protocols for wireless mesh networks.” Network, IEEE 22.1 (2008): 6–12.
Siddiqui, Muhammad Shoaib, and Choong Seon Hong. “Security issues in wireless mesh networks.” Multimedia and Ubiquitous Engineering, 2007. MUE’07. International Conference on. IEEE, 2007.
J. Sen, N. Funabiki et al. Secure routing in wireless mesh networks. Wireless Mesh Networks (book chapter), INTECH, Croatia; 2011.
Cheikhrouhou, O.; Maknavicius, M. & Chaouchi, H.: Security Architecture in a Multi-Hop Mesh Network. In:, Proceedings of the 5th Conference on Security Architecture Research(SAR), Seignosse-Landes, 2006.
Parthasarathy, Mohan. “Protocol for carrying authentication and network access (PANA) threat analysis and security requirements.” 2005.
Zhu, Sencun, et al. “LHAP: a lightweight hop-by-hop authentication protocol for ad-hoc networks.” Distributed Computing Systems Workshops, 2003. Proceedings. 23rd International Conference on. IEEE, 2003.
He, Bing, et al. “An efficient authenticated key establishment scheme for wireless mesh networks.” Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE. IEEE, 2010.
Uddin, Mueen, et al. “Improving performance of mobile Ad Hoc networks using efficient tactical On demand distance vector (TAODV) routing algorithm.” International Journal of Innovative Computing, Information and Control (IJICIC), pp. 4375–4389, 8(6) 2012.
Ogburn, Monique, Claude Turner, and Pushkar Dahal. “Homomorphic encryption.” Procedia Computer Science 20, pp. 502–509, 2013.
Singh, Vineet Kumar, and Maitreyee Dutta. “Secure Cloud Network using Partial Homomorphic Algorithms.” International Journal of Advanced Research in Computer Science 5.5, 2014.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer India
About this paper
Cite this paper
Rathee, G., Saini, H. (2016). A Secure Homomorphic Routing Technique in Wireless Mesh Network (HRT for WMN). In: Satapathy, S.C., Mandal, J.K., Udgata, S.K., Bhateja, V. (eds) Information Systems Design and Intelligent Applications. Advances in Intelligent Systems and Computing, vol 434. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2752-6_43
Download citation
DOI: https://doi.org/10.1007/978-81-322-2752-6_43
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2750-2
Online ISBN: 978-81-322-2752-6
eBook Packages: EngineeringEngineering (R0)