Pseudonym Based Security Architecture for Wireless Mesh Network
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 4
Abstract
Abstract : Wireless Mesh Network (WMN) is a wireless network with mesh topology and is expected to be widespread due to the advantages such as low deployment cost, easy maintenance, robustness, scalability, reliable service coverage and high performance. It has self-configuring and self-healing ability and is compatible, interoperable with existing wireless networks. With these advantages, WMN inherits security issues that need to be considered before the deployment and proliferation of the network, as it is unappealing to subscribers to obtain services without security and privacy. It is difficult to achieve both, privacy and security together in a system but an attempt is made by designing a ticket-based security architecture achieving anonymity and traceability in WMN. Anonymity provides protection to the users to access network services without being traced i.e. preserving the identity of the user and has been extensively studied in payment-based systems such as e-cash and peer-to-peer systems. When anonymity is achieved, few entities tend to misbehave by imposing attacks as they remain anonymous. This affects network security and hence, misbehaving entities have to be traced. The clustering concept is included in the system to increase network performance and to reduce topology updating overhead in the network.
Authors and Affiliations
Ms. Sharvani R. Marathe , Dr. Santosh L. Deshpande
Copy-Move Image Forgery Detection Based on Center-SymmetricLocal Binary Pattern
Abstract: This paper presents a method to detect copy-move image forgery using CS-LBP (centre symmetriclocal binary pattern), an extension of basic local binary pattern. In the proposed method, firstly gray levelco...
A note on application of Tensor Space Model for semantic problems
A Model is an abstract representation of system that allows the investigation of properties of the system and in some cases prediction of future outcomes We have seen many mathematical models but Tensor Space Mo...
A review on Visualization Approaches of Data mining in heavyspatial databases
Abstract: Data mining is the phenomenon to extract and recognized the new required pattern or types from thelarge data seta or data bases and whatever required data is being extracted and separated from large datab...
Recapitulating the development initiatives of a robust information security safeguard: RITSB-the proposed solution
Most current information security systems performance vary with the nature of the filed its being operating. With an increased emphasizes on the adoption of security tools and technologies, the anomalies and &nb...
Improved Method for Pattern Discovery in Text Mining
Abstract: The proposed technique uses two processes, pattern deploying and pattern evolving, to refine the discovered patterns in text documents. The experimental results show that the proposed model outperforms no...