Browse > Article
http://dx.doi.org/10.3837/tiis.2014.12.024

Trust Based Authentication and Key Establishment for Secure Routing in WMN  

Akilarasu, G. (Dept. of Computer Science and Engineering, Thiagarajar College of Engineering)
Shalinie, S. Mercy (Head Department of Computer Science and Engineering, Thiagarajar College of Engineering)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.8, no.12, 2014 , pp. 4661-4676 More about this Journal
Abstract
In Wireless Mesh Networks (WMN), an authentication technique can be compromised due to the distributed network architecture, the broadcast nature of the wireless medium and dynamic network topology. Several vulnerabilities exist in different protocols for WMNs. Hence, in this paper, we propose trust based authentication and key establishment for secure routing in WMN. Initially, a trust model is designed based on Ant Colony Optimization (ACO) to exchange the trust information among the nodes. The routing table is utilized to select the destination nodes, for which the link information is updated and the route verification is performed. Based on the trust model, mutual authentication is applied. When a node moves from one operator to another for accessing the router, inter-authentication will be performed. When a node moves within the operator for accessing the router, then intra-authentication will be performed. During authentication, keys are established using identity based cryptography technique. By simulation results, we show that the proposed technique enhances the packet delivery ratio and resilience with reduced drop and overhead.
Keywords
Wireless Mesh Networks; Trust; Authentication; Ant Colony Optimization (ACO) and Key establishment;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M.Jayanthi and .M.A.Mukunthan, "A Security Architecture for Implementing Anonymity and Traceability in Wireless Mesh Network using Clustering Concept," International Journal of Soft Computing and Engineering (IJSCE), vol. 1, Issue-ETIC-2011, January, 2012.
2 Celia Li, Zhuang Wang, and Cungang Yang, "Secure Routing for Wireless Mesh Networks," International Journal of Network Security, vol. 13, no. 2, pp. 109-120, Sept, 2011.
3 Francesco Oliviero and Simon Pietro Romano, "A Reputation-based Metric for Secure Routing in Wireless Mesh Networks," IEEE GLOBECOM, 2008.
4 Shams Qazi, Yi Mu and Willy Susilo, "Securing Wireless Mesh Networks with Ticket-Based Authentication," in Proc. of 2nd International Conference on Signal Processing and Communication Systems, 2008.
5 Tianhan Gao, Nan Guo and Kangbin Yim, "Delegation-based Mutual Authentication Scheme for Multi-operator Wireless Mesh Network," in Proc. of Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2012.
6 Bing He and Dharma P. Agrawal, "An Identity-based Authentication and Key Establishment Scheme for Multi-operator Maintained Wireless Mesh Networks," in Proc. of 7th International Conference on Mobile Adhoc and Sensor Systems (MASS), 2010.
7 Chen Dajun, Wang Chao and Lin Qiang, "Ant-Based Trusted Routing Algorithm for Wireless Mesh Networks," in Proc. of Asia Pacific Conference on Postgraduate Research in Microelectronics & Electronics, 2009.
8 Ramya R, Navamani T.M and Yogesh, "Secured Identity Based Routing and Privacy Preservation in Wireless Mesh Networks," IEEE-International Conference on Recent Trends in Information Technology, ICRTIT 2011.
9 Tianhan Gao, Nan Guo, Kangbin Yim and Qingshan Li, "Anonymity Scheme with Unlink ability Property in Wireless Mesh Networks," in Proc. of Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2013.
10 Xin Zhao, Yuqin Lv, Tet Hin Yeap and Bin Hou, "A Novel Authentication and Key Agreement Scheme for Wireless Mesh Networks," in Proc. of Fifth International Joint Conference on INC, IMS and IDC, 2009.
11 Farah Kandah, Yashaswi Singh and Weiyi Zhang, "Mitigating Eavesdropping Attack Using Secure Key Management Scheme in Wireless Mesh Networks," Journal of Communications, vol. 7, no.8, 2012.
12 Jaydip Sen, "Secure and Privacy-Preserving Authentication Protocols for Wireless Mesh Networks," Applied Cryptography and Network Security.
13 Jaydip Sen, "Efficient Routing Anomaly Detection in Wireless Mesh Networks," in Proc. of First International Conference on Integrated Intelligent Computing, 978-0-7695-4152-5/10 $26.00 $(c)$ IEEE, 2010.
14 Network Simulator: http:///www.isi.edu/nsnam/ns