International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME-2012) 2012
DOI: 10.1109/icprime.2012.6208299
|View full text |Cite
|
Sign up to set email alerts
|

An improved security mechanism for high-throughput multicast routing in wireless mesh networks against Sybil attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 16 publications
0
6
0
Order By: Relevance
“…The SeGrOM [5] offers high delivery ratio with minor encryption overhead, but the security attack against the multicast protocol is not addressed. Finally, RKP [11] tries to overcome the drawbacks of S-ODMRP, but it fails to scale for many attackers.…”
Section: Performance Analysismentioning
confidence: 99%
“…The SeGrOM [5] offers high delivery ratio with minor encryption overhead, but the security attack against the multicast protocol is not addressed. Finally, RKP [11] tries to overcome the drawbacks of S-ODMRP, but it fails to scale for many attackers.…”
Section: Performance Analysismentioning
confidence: 99%
“…As the expansion and extension of the Internet, Wireless Mesh Networks (WMNs) have broad application prospects in many fields such as households, businesses and public places owing to the useful characteristics of self-organization, self-configuring, flexibility [1]. However, the characteristics of WMNs including the easy accessing, multi-hop without centricity and devices outside of wireless mesh networks bring a great challenge to the security of WMNs as well [2,3]. Therefore, comparing with the traditional wireless networks, the chance of being suffered and attacked is much greater in wireless mesh networks, which brings more security threats.…”
Section: Introductionmentioning
confidence: 99%
“…(2) has got the difference information diff. If the number of the ring of chain keys conforms to (2), and according to the Lemma 2 when some nodes are captured, the probability that the adversary obtains the difference information of the indexes of two chain keys in any other uncaptured nodes is negligible. In conclusion, the mutual information of CK-AE protocol between the parties in the ideal model is computationally indistinguishable for the with the information in the real model.…”
Section: Theorem 1 Based On the Crs Model The Ck-ae Protocol Is Secmentioning
confidence: 99%
“…However, due to the openness of deployment, the limitation of resource and the Big Data environment, security emerges as a challenging issue in ubiquitous WSN. Sybil attack is a particularly harmful attack which can forge a large number of fake identities to disrupt the routing protocol, distributed storage, and malicious behavior detection [2]. Moreover, the entire communication of the network will even be destroyed.…”
Section: Introductionmentioning
confidence: 99%