Performance Evaluation of Security Mechanisms in RAOLSR protocol for Wireless Mesh Networks

被引:0
|
作者
Saavedra Benitez, Yesica Imelda [1 ]
Ben-Othman, Jalel [2 ]
Claude, Jean-Pierre [3 ]
机构
[1] Technol Inst Toluca, Toluca, Mexico
[2] Univ Paris 13, Lab L2TI, F-93430 Villetaneuse, France
[3] Univ Versailles, Lab CNRS Prism, Versailles, France
来源
2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC) | 2014年
关键词
Security; Routing Protocol; Wireless Mesh Networks; Radio Aware Optimized Link State Routing; IBE; Identity Based Encryption;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In this paper, we have proposed the IBE-RAOLSR and ECDSA-RAOLSR protocols for WMNs (Wireless Mesh Networks), which contributes to security routing protocols. We have implemented the IBE (Identity Based Encryption) and ECDSA (Elliptic Curve Digital Signature Algorithm) methods to secure messages in RAOLSR (Radio Aware Optimized Link State Routing), namely TC (Topology Control) and Hello messages. We then compare the ECDSA-based RAOLSR with IBE-based RAOLSR protocols. This study shows the great benefits of the IBE technique in securing RAOLSR protocol for WMNs. Through extensive ns-3 (Network Simulator-3) simulations, results have shown that the IBE-RAOLSR outperforms the ECDSA-RAOLSR in terms of overhead and delay. Simulation results show that the utilize of the IBE-based RAOLSR provides a greater level of security with light overhead.
引用
收藏
页码:1808 / 1812
页数:5
相关论文
共 50 条
  • [31] Design and implementation of MobiSEC: A complete security architecture for wireless mesh networks
    Martignon, Fabio
    Paris, Stefano
    Capone, Antonio
    COMPUTER NETWORKS, 2009, 53 (12) : 2192 - 2207
  • [32] Performance evaluation of scheduling in IEEE 802.16 based wireless mesh networks
    Han, Bo
    Jia, Weijia
    Lin, Lidong
    COMPUTER COMMUNICATIONS, 2007, 30 (04) : 782 - 792
  • [33] Game theoretical routing protocol with fairness problem in wireless mesh networks
    Ji, Wen-Jiang
    Ma, Jian-Feng
    Tian, You-Liang
    Ma, Zhuo
    Tongxin Xuebao/Journal on Communications, 2012, 33 (11): : 17 - 23
  • [34] A Dynamic and Reliable Mesh Routing Protocol for Wireless Mesh Networks (DRMRP)
    Omari, Ahmed H.
    Khrisat, Ala'a H.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (04): : 16 - 21
  • [35] Experimentation and Performance Evaluation of Rate Adaptation Algorithms in Wireless Mesh Networks
    Ancillotti, Emilio
    Bruno, Raffaele
    Conti, Marco
    PE-WASUN'08: PROCEEDINGS OF THE FIFTH ACM INTERNATIONAL SYMPOSIUM ON PERFORMANCE EVALUATION OF WIRELESS AD-HOC, SENSOR, AND UBIQUITOUS NETWORKS, 2008, : 7 - 14
  • [36] Enhancement of Security and Performance in Wireless Mesh Networks Using Multi-Key Generation
    Parvathy, K.
    Karthigha, M.
    2017 INTERNATIONAL CONFERENCE OF ELECTRONICS, COMMUNICATION AND AEROSPACE TECHNOLOGY (ICECA), VOL 1, 2017, : 135 - 139
  • [37] MAC LAYER SECURITY ISSUES IN WIRELESS MESH NETWORKS
    Reddy, K. Ganesh
    Thilagam, P. Santhi
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS (ICCS-2015), 2016, 1715
  • [38] A survey on security and privacy issues in Wireless Mesh Networks
    Sgora, Aggeliki
    Vergados, Dimitrios D.
    Chatzimisios, P.
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) : 1877 - 1889
  • [39] Enhanced Security Protocol in Wireless Sensor Networks
    Aseri, T. C.
    Singla, N.
    INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2011, 6 (02) : 214 - 221
  • [40] A QoE Fuzzy Routing Protocol for Wireless Mesh Networks
    Gomes, Rafael
    Junior, Waldir
    Cerqueira, Eduardo
    Abelem, Antonio
    FUTURE MULTIMEDIA NETWORKING, PROCEEDINGS, 2010, 6157 : 1 - +