2011 International Conference on Recent Trends in Information Technology (ICRTIT) 2011
DOI: 10.1109/icrtit.2011.5972396
|View full text |Cite
|
Sign up to set email alerts
|

Secured Identity Based Routing and privacy preservation in Wireless Mesh Networks

Abstract: Wireless Mesh Networks (WMNs) have been expected to be the ultimate solution for the next decade wireless networking. The attractions of WMNs include easy set-up on the fly, off-the-shelf cost, flexible interoperability with other networks, and highly reliable connectivity. One main challenge in the design of these networks is their vulnerability to security attacks. The attacker will possibly be able to identify an ongoing communication session between any two network users by analyzing the network traffic pa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…A gateway router provides access to conventional clients and interconnects sensor, cellular, ad hoc and other networks to the internet. The gateway routers are also referred to as the internet gateways (IGWs) (Sen, 2012;Ramya et al, 2011).…”
Section: Wireless Mesh Networkmentioning
confidence: 99%
“…A gateway router provides access to conventional clients and interconnects sensor, cellular, ad hoc and other networks to the internet. The gateway routers are also referred to as the internet gateways (IGWs) (Sen, 2012;Ramya et al, 2011).…”
Section: Wireless Mesh Networkmentioning
confidence: 99%
“…However, this protocol will not be applied for WMNs where there is no centralized server to process the payment receipts. In our previous work [ 8 ], we have proposed a routing scheme that gives better protection against security attacks and anonymity in wireless mesh networks. We introduced secured identity based routing scheme to provide security against attacks and anonymity.…”
Section: Related Workmentioning
confidence: 99%
“…Ramya R et al [8] have proposed a Secured Identity Based Routing (SIBR) scheme in which every node is assigned with security cards for providing an efficient authentication. The major goal of the proposed system is to reduce the number of levels at which an attack can take place by providing anonymity in routing.…”
Section: Literature Reviewmentioning
confidence: 99%