Privacy preservation with RTT-based detection for wireless mesh networks

被引:3
作者
Roy, Amit Kumar [1 ]
Khan, Ajoy Kumar [1 ]
机构
[1] Assam Univ, Dept Comp Sci & Engn, Silchar, Assam, India
关键词
wireless mesh networks; radio networks; data privacy; mobility management (mobile radio); telecommunication security; protocols; message authentication; telecommunication network topology; cryptographic protocols; routing protocols; transfer ticket; external attacks; trip time-based detection protocol; internal attacks; WMNs; privacy preservation; nonce; handoff authentication process; wormhole attack; RTT-based detection; centralised authority; efficient handoff authentication protocol; HANDOVER AUTHENTICATION MECHANISM; SCHEME; TICKET;
D O I
10.1049/iet-ifs.2019.0492
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless mesh networks (WMNs) upraised as superior technology offering all aspects of services as compared to conventional networks. Due to the absence of centralised authority, WMNs suffers from both external and internal attacks, which decrease the overall performance of WMNs. In this study, the authors proposed an efficient handoff authentication protocol with privacy preservation of nonce and transfer ticket against external attacks during handoff and proposed round trip time (RTT)-based detection protocol to resist against internal attacks in WMNs. For privacy preservation of nonce and transfer ticket, encryption of the nonce and transfer ticket during handoff authentication process was considered. For detection, the calculation of RTT and processing time to identify the malicious nodes forming wormhole link were considered. The proposed work prevents the AODV routing protocol against the wormhole attack in WMNs. The simulation of the proposed work was done using NS-3 simulator, and the experimental results show that the performance of the proposed method prevents WMNs from both external and internal attacks.
引用
收藏
页码:391 / 400
页数:10
相关论文
共 38 条
  • [1] A survey on wireless mesh networks
    Akyildiz, IF
    Wang, XD
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2005, 43 (09) : S23 - S30
  • [2] Altman Y., 2016, U.S. Patent No, Patent No. [9,479,523, 9479523]
  • [3] Biswas Juhi, 2014, 2014 9th International Conference on Industrial and Information Systems (ICIIS), P1, DOI 10.1109/ICIINFS.2014.7036535
  • [4] BLOM R, 1985, LECT NOTES COMPUT SC, V209, P335
  • [5] Capkun S., 2003, ACM WORKSHOP SECURIT, P21
  • [6] Topological comparison-based wormhole detection for MANET
    Chan, King Sun
    Alam, Mohammad Rafiqul
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (07) : 1051 - 1068
  • [7] A Robust and Efficient Privacy Aware Handover Authentication Scheme for Wireless Networks
    Chaudhry, Shehzad Ashraf
    Farash, Mohammad Sabzinejad
    Naqvi, Husnain
    Islam, S. K. Hafizul
    Shon, Taeshik
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 93 (02) : 311 - 335
  • [8] Dromard J, 2013, 2013 20TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT)
  • [9] Du W., 2005, ACM Transactions on Information and Systems Security, V8, P228, DOI 10.1145/1065545.1065548
  • [10] Nframe: A privacy-preserving with non-frameability handover authentication protocol based on (t, n) secret sharing for LTE/LTE-A networks
    Fu, Anmin
    Qin, Ningyuan
    Wang, Yongli
    Li, Qianmu
    Zhang, Gongxuan
    [J]. WIRELESS NETWORKS, 2017, 23 (07) : 2165 - 2176