INTEGRATED SECURITY FRAMEWORK FOR HYBRID WIRELESS MESH NETWORKS
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 4
Abstract
Hybrid Wireless Mesh Network is a special case of frastructural mesh network which utilizes heterogeneous ireless networks for communication. The integration of WMNs with other networks such as the Internet, cellular, IEEE 802.11, IEEE 802.15, IEEE 802.16, sensor networks, etc., can be ccomplished through the gateway and bridging functions in the mesh routers. An integrated security mechanism is a key challenge in the integration on such networks. In this paper, we analyze the problems in the integration of various eterogeneous wireless network’s. Thereafter, we proposed a integrated security framework for the hybrid WMN which helps in building a secured environment for communication within he network. The proposed mechanism efficiently uses the haracteristics of WMN’s, mutual authentication and secretes key cryptography to provide a integrated security for eterogeneous wireless mesh networks.
Authors and Affiliations
Paramjeet Rawat , Dr. M. S. Aswal
Literature Review on Mobile MPLS Techniques
Mobile MPLS (Multi Protocol Label Switching) is a new technique which integrates the Mobile IP (MIP) and MPLS and thus inherits the advantages of both. MIP supports the mobility whereas MPLS provides faster streaming thr...
Grid Computing: A Collaborative Approach in Distributed Environment for Achieving Parallel Performance and Better Resource Utilization
From the very beginning various measures are taken or consider for better utilization of available limited resources in he computer system for operational environment, this is came n consideration because most of the...
Invariant Moments based War Scene Classification using ANN and SVM: A Comparative Study
In this paper we are trying to classify a war scene from the natural scene. For this purpose two set of image categories are taken viz., opencountry & war tank. By using Invariant Moments features are extracted from...
Protection of Public Network Communication by using Internet Protocol Security
This paper deals with the issue of the protection of public etwork c description of custom cipher algorithm mplementation method is given. Paper also contains xperiment description with results. In the existing...
Secured Image Sharing and Deletion in the Cloud Storage Using Access Policies
Cloud computing is a general term for anything that involves delivering hosted services, Anything as a Service (AaaS), over the web on demand basis. It uses web and central remote servers to maintain data and application...