Performance Evaluation of Security Mechanisms in RAOLSR protocol for Wireless Mesh Networks

被引:0
|
作者
Saavedra Benitez, Yesica Imelda [1 ]
Ben-Othman, Jalel [2 ]
Claude, Jean-Pierre [3 ]
机构
[1] Technol Inst Toluca, Toluca, Mexico
[2] Univ Paris 13, Lab L2TI, F-93430 Villetaneuse, France
[3] Univ Versailles, Lab CNRS Prism, Versailles, France
来源
2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC) | 2014年
关键词
Security; Routing Protocol; Wireless Mesh Networks; Radio Aware Optimized Link State Routing; IBE; Identity Based Encryption;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In this paper, we have proposed the IBE-RAOLSR and ECDSA-RAOLSR protocols for WMNs (Wireless Mesh Networks), which contributes to security routing protocols. We have implemented the IBE (Identity Based Encryption) and ECDSA (Elliptic Curve Digital Signature Algorithm) methods to secure messages in RAOLSR (Radio Aware Optimized Link State Routing), namely TC (Topology Control) and Hello messages. We then compare the ECDSA-based RAOLSR with IBE-based RAOLSR protocols. This study shows the great benefits of the IBE technique in securing RAOLSR protocol for WMNs. Through extensive ns-3 (Network Simulator-3) simulations, results have shown that the IBE-RAOLSR outperforms the ECDSA-RAOLSR in terms of overhead and delay. Simulation results show that the utilize of the IBE-based RAOLSR provides a greater level of security with light overhead.
引用
收藏
页码:1808 / 1812
页数:5
相关论文
共 50 条
  • [1] Performance Evaluation of a Multicast Routing Protocol for Wireless Mesh Networks Considering Network Load
    Oe, Kiyotaka
    Koyama, Akio
    Barolli, Leonard
    2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2013, : 591 - 597
  • [2] Routing management for performance and security tradeoff in wireless mesh networks
    Helber Silva
    Aldri Santos
    Michele Nogueira
    International Journal of Information Security, 2015, 14 : 35 - 46
  • [3] Routing management for performance and security tradeoff in wireless mesh networks
    Silva, Helber
    Santos, Aldri
    Nogueira, Michele
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2015, 14 (01) : 35 - 46
  • [4] A Survey on Security in Wireless Mesh Networks
    Yi, Ping
    Wu, Yue
    Zou, Futai
    Liu, Ning
    IETE TECHNICAL REVIEW, 2010, 27 (01) : 6 - 14
  • [5] Differentiated Security in Wireless Mesh Networks
    Gamer, Thomas
    Voelker, Lars
    Zitterbart, Martina
    Q2SWINET'08: PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, 2008, : 111 - 112
  • [6] A security framework for wireless mesh networks
    Mogre, Parag S.
    Graffi, Kalman
    Hollick, Matthias
    Steinmetz, Ralf
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2011, 11 (03) : 371 - 391
  • [7] Differentiated security in wireless mesh networks
    Gamer, Thomas
    Voelker, Lars
    Zitterbart, Martina
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (03) : 257 - 266
  • [8] Security in Wireless Mesh Networks
    Zarai, Faouzi
    Daly, Ikbel
    Banat, Mohammad M.
    Kamoun, Lotfi
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (11): : 116 - 130
  • [9] SEAODV: A Security Enhanced AODV routing protocol for wireless mesh networks
    Li C.
    Wang Z.
    Yang C.
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2010, 6480 (PART 2): : 1 - 16
  • [10] An augmented security protocol for WirelessMAN mesh networks
    Hamid, Zara
    Khan, Shoab A.
    2006 International Symposium on Communications and Information Technologies,Vols 1-3, 2006, : 46 - 50