Pseudonym Based Security Architecture for Wireless Mesh Network

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 4

Abstract

Abstract : Wireless Mesh Network (WMN) is a wireless network with mesh topology and is expected to be widespread due to the advantages such as low deployment cost, easy maintenance, robustness, scalability, reliable service coverage and high performance. It has self-configuring and self-healing ability and is compatible, interoperable with existing wireless networks. With these advantages, WMN inherits security issues that need to be considered before the deployment and proliferation of the network, as it is unappealing to subscribers to obtain services without security and privacy. It is difficult to achieve both, privacy and security together in a system but an attempt is made by designing a ticket-based security architecture achieving anonymity and traceability in WMN. Anonymity provides protection to the users to access network services without being traced i.e. preserving the identity of the user and has been extensively studied in payment-based systems such as e-cash and peer-to-peer systems. When anonymity is achieved, few entities tend to misbehave by imposing attacks as they remain anonymous. This affects network security and hence, misbehaving entities have to be traced. The clustering concept is included in the system to increase network performance and to reduce topology updating overhead in the network.

Authors and Affiliations

Ms. Sharvani R. Marathe , Dr. Santosh L. Deshpande

Keywords

Related Articles

 Towards Adapting NAS Mechanism over Solid State Disks

 Abstract: Flash memory storage such as SSDs (Solid State disks) have been gaining popularity due to its low energy consumption and durability in embedded systems and laptops. With the fast technical improvement,...

 Message Passing Algorithm: A Tutorial Review

 This tutorial paper reviews the basics of error correcting codes like linear block codes and LDPC. The error correcting codes which are also known as channel codes enable to recover the original message from the...

 A Novel approach for Graphical User Interface development and  real time Object and Face Tracking using Image Processing and  Computer Vision Techniques implemented in MATLAB

 Image Processing is an advancement in the Signal processing domain where the input is an image or video and output can be image, video or in any other forms. With daily advances in Human-Computer interaction, I...

 Simulation of Route Optimization with load balancing Using AntNet System

 This paper is based on analysis of the performance of load balancing and route optimization in computerized networks. The complete system model shows the scenario of Packet distribution between nodes, and if cong...

 A Survey of Agent Based Pre-Processing and Knowledge  Retrieval

 Information retrieval is the major task in present scenario as quantum of data is increasing with a tremendous speed. So, to manage & mine knowledge for different users as per their interest, is the goal of e...

Download PDF file
  • EP ID EP131906
  • DOI 10.9790/0661-16470105
  • Views 109
  • Downloads 0

How To Cite

Ms. Sharvani R. Marathe, Dr. Santosh L. Deshpande (2014).  Pseudonym Based Security Architecture for Wireless Mesh Network. IOSR Journals (IOSR Journal of Computer Engineering), 16(4), 1-5. https://europub.co.uk/articles/-A-131906