Pseudonym Based Security Architecture for Wireless Mesh Network

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 4

Abstract

Abstract : Wireless Mesh Network (WMN) is a wireless network with mesh topology and is expected to be widespread due to the advantages such as low deployment cost, easy maintenance, robustness, scalability, reliable service coverage and high performance. It has self-configuring and self-healing ability and is compatible, interoperable with existing wireless networks. With these advantages, WMN inherits security issues that need to be considered before the deployment and proliferation of the network, as it is unappealing to subscribers to obtain services without security and privacy. It is difficult to achieve both, privacy and security together in a system but an attempt is made by designing a ticket-based security architecture achieving anonymity and traceability in WMN. Anonymity provides protection to the users to access network services without being traced i.e. preserving the identity of the user and has been extensively studied in payment-based systems such as e-cash and peer-to-peer systems. When anonymity is achieved, few entities tend to misbehave by imposing attacks as they remain anonymous. This affects network security and hence, misbehaving entities have to be traced. The clustering concept is included in the system to increase network performance and to reduce topology updating overhead in the network.

Authors and Affiliations

Ms. Sharvani R. Marathe , Dr. Santosh L. Deshpande

Keywords

Related Articles

 Copy-Move Image Forgery Detection Based on Center-SymmetricLocal Binary Pattern

 Abstract: This paper presents a method to detect copy-move image forgery using CS-LBP (centre symmetriclocal binary pattern), an extension of basic local binary pattern. In the proposed method, firstly gray levelco...

 A note on application of Tensor Space Model for semantic problems

 A Model is an abstract representation of system that allows the investigation of properties of the system and in some cases prediction of future outcomes We have seen many mathematical models but Tensor Space Mo...

 A review on Visualization Approaches of Data mining in heavyspatial databases

 Abstract: Data mining is the phenomenon to extract and recognized the new required pattern or types from thelarge data seta or data bases and whatever required data is being extracted and separated from large datab...

 Recapitulating the development initiatives of a robust information  security safeguard: RITSB-the proposed solution

 Most current information security systems performance vary with the nature of the filed its being operating. With an increased emphasizes on the adoption of security tools and technologies, the anomalies and &nb...

 Improved Method for Pattern Discovery in Text Mining

 Abstract: The proposed technique uses two processes, pattern deploying and pattern evolving, to refine the discovered patterns in text documents. The experimental results show that the proposed model outperforms no...

Download PDF file
  • EP ID EP131906
  • DOI 10.9790/0661-16470105
  • Views 123
  • Downloads 0

How To Cite

Ms. Sharvani R. Marathe, Dr. Santosh L. Deshpande (2014).  Pseudonym Based Security Architecture for Wireless Mesh Network. IOSR Journals (IOSR Journal of Computer Engineering), 16(4), 1-5. https://europub.co.uk/articles/-A-131906