Performance Evaluation of Security Mechanisms in RAOLSR protocol for Wireless Mesh Networks

被引:0
|
作者
Saavedra Benitez, Yesica Imelda [1 ]
Ben-Othman, Jalel [2 ]
Claude, Jean-Pierre [3 ]
机构
[1] Technol Inst Toluca, Toluca, Mexico
[2] Univ Paris 13, Lab L2TI, F-93430 Villetaneuse, France
[3] Univ Versailles, Lab CNRS Prism, Versailles, France
来源
2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC) | 2014年
关键词
Security; Routing Protocol; Wireless Mesh Networks; Radio Aware Optimized Link State Routing; IBE; Identity Based Encryption;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In this paper, we have proposed the IBE-RAOLSR and ECDSA-RAOLSR protocols for WMNs (Wireless Mesh Networks), which contributes to security routing protocols. We have implemented the IBE (Identity Based Encryption) and ECDSA (Elliptic Curve Digital Signature Algorithm) methods to secure messages in RAOLSR (Radio Aware Optimized Link State Routing), namely TC (Topology Control) and Hello messages. We then compare the ECDSA-based RAOLSR with IBE-based RAOLSR protocols. This study shows the great benefits of the IBE technique in securing RAOLSR protocol for WMNs. Through extensive ns-3 (Network Simulator-3) simulations, results have shown that the IBE-RAOLSR outperforms the ECDSA-RAOLSR in terms of overhead and delay. Simulation results show that the utilize of the IBE-based RAOLSR provides a greater level of security with light overhead.
引用
收藏
页码:1808 / 1812
页数:5
相关论文
共 50 条
  • [21] Performance Evaluation of CANCAR Algorithm in Realistic Wireless Mesh Networks
    Svigelj, Ales
    Pertovt, Erik
    Mohorcic, Mihael
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 115 (03) : 1899 - 1917
  • [22] Wireless mesh networks: a survey
    Akyildiz, IF
    Wang, XD
    Wang, WL
    COMPUTER NETWORKS, 2005, 47 (04) : 445 - 487
  • [23] On Security of Opportunistic Routing Protocol in Wireless Sensor Networks
    Sharma, Archana
    Singh, Yashwant
    PROCEEDINGS OF RECENT INNOVATIONS IN COMPUTING, ICRIC 2019, 2020, 597 : 407 - 419
  • [24] A routing protocol suitable for backhaul access in wireless mesh networks
    Campista, Miguel Elias M.
    Costa, Luis Henrique M. K.
    Duarte, Otto Carlos M. B.
    COMPUTER NETWORKS, 2012, 56 (02) : 703 - 718
  • [25] Multicast routing protocol for wireless mesh networks
    Fang Y.-L.
    Li F.-M.
    Wu P.
    Liu X.-H.
    Ma X.-L.
    Ruan Jian Xue Bao/Journal of Software, 2010, 21 (06): : 1308 - 1325
  • [26] Analysis of Security Routing Protocol for Wireless Sensor Networks
    Wang, Yi
    Cao, Zhenjie
    Bai, Xue
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON LOGISTICS, ENGINEERING, MANAGEMENT AND COMPUTER SCIENCE (LEMCS 2015), 2015, 117 : 1074 - 1078
  • [27] Routing Protocol for Heterogeneous Wireless Mesh Networks
    Al-Saadi, Ahmed
    Setchi, Rossitza
    Hicks, Yulia
    Allen, Stuart M.
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (12) : 9773 - 9786
  • [28] An Efficient ORR Protocol for Wireless Mesh Networks
    Reddy, Chudi Sandeep
    Pati, Hemanta Kumar
    2012 2ND IEEE INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2012, : 141 - 146
  • [29] Security Mechanisms for Wireless Sensor Networks
    Ren, Xiuli
    Yul, Haibin
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (3B): : 155 - 161
  • [30] A Unified Security Framework for Multi-domain Wireless Mesh Networks
    Wang, Ze
    Ma, Maode
    Liu, Wenju
    Wei, Xixi
    INFORMATION AND COMMUNICATIONS SECURITY, 2011, 7043 : 319 - +