2011 IEEE International Conference on Communications (ICC) 2011
DOI: 10.1109/icc.2011.5962921
|View full text |Cite
|
Sign up to set email alerts
|

On Securing HWMP Using IBC

Abstract: In this paper, we propose a security mechanisms for the Hybrid-Wireless-Mesh Protocol (HWMP). Our mechanisms is based on the Identity Based Crytography (IBC). The motivation behind using IBC is that it eliminates the need to verify the authenticity of public keys. We have implemented the IBC technique to secure control message in HWMP, namely RREQ (Path Request) and RREP (Path Reply). In these Control messages, we are interested only by mutable (i.e. fields that an changing during control packet exchange). Thr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
3
2
2

Relationship

2
5

Authors

Journals

citations
Cited by 14 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…Ben-Othman and Benitez [47,48] propose an Identity-Based Crytography (IBC) mechanism to increase the security level of the HWMP. The authors propose two modifications: trust management for internal nodes and digital signature of routing messages with IBC for external nodes.…”
Section: A Survey On Security and Privacy Issues In Wireless Mesh Netmentioning
confidence: 99%
“…Ben-Othman and Benitez [47,48] propose an Identity-Based Crytography (IBC) mechanism to increase the security level of the HWMP. The authors propose two modifications: trust management for internal nodes and digital signature of routing messages with IBC for external nodes.…”
Section: A Survey On Security and Privacy Issues In Wireless Mesh Netmentioning
confidence: 99%
“…In , we proposed different techniques based on cryptographic methods in order to protect against external and internal attacks. This paper compares the ECDSA‐based HWMP against IBE‐based HWMP.…”
Section: Related Workmentioning
confidence: 99%
“…In [6], [7], [8] and [9], we proposed different techniques based on cryptographic methods in order to protect against external and internal attacks. This paper has implemented the IBE technique to secure messages in RA-OLSR.…”
Section: Related Workmentioning
confidence: 99%