Call for Paper - November 2020 Edition
IJCA solicits original research papers for the November 2020 Edition. Last date of manuscript submission is October 20, 2020. Read More

Efficient Handoff Routing (EHR) in WMN

Print
PDF
IJCA Proceedings on International Conference on Communication, Computing and Virtualization
© 2016 by IJCA Journal
ICCCV 2016 - Number 1
Year of Publication: 2016
Authors:
Geetanjali Rathee
Hemraj Saini

Geetanjali Rathee and Hemraj Saini. Article: Efficient Handoff Routing (EHR) in WMN. IJCA Proceedings on International Conference on Communication, Computing and Virtualization ICCCV 2016(1):29-34, August 2016. Full text available. BibTeX

@article{key:article,
	author = {Geetanjali Rathee and Hemraj Saini},
	title = {Article: Efficient Handoff Routing (EHR) in WMN},
	journal = {IJCA Proceedings on International Conference on Communication, Computing and Virtualization},
	year = {2016},
	volume = {ICCCV 2016},
	number = {1},
	pages = {29-34},
	month = {August},
	note = {Full text available}
}

Abstract

In WMN, handoff is a significant parameter of research. Whenever a mesh client leaves the range of serving mesh router and searches for accessing a new router based on good SNR (signal to Noise) ratio, a handoff procedure takes place. During mobility, packet transmission may enhance the number of security threats and network performance degradation issues which needs a secure routing protocol to be considered. In order to overwhelm over these hitches, this manuscript proposes a technique called Efficient Handoff Routing EHR. The suggested technique is compared and evaluated over network metrics i. e. handoff latency, throughput, end-to-end delay and packet delivery ratio. Further the approach is proved by describing a formal analysis over parameters.

References

  • Akyildiz, I. F. , Xudong W. A survey on wireless mesh networks. 2005. In; IEEE conference on Communications Magazine, 43(9).
  • Franklin A. A. , Murthy C. S. R. 2007. An introduction to wireless mesh networks. Security in Wireless Mesh Networks(book chapter), CRC Press,USA.
  • Ben Salem, N. , Hubaux, J. -P. 2006. Securing Wireless Mesh Networks. In: IEEE Wireless Communication, 13(2), pp. 50-55.
  • Amir, Yair,. 2006. Fast handoff for seamless wireless mesh networks. Proceedings of the 4th international conference on Mobile systems, applications and services. ACM.
  • Draves, R. , Jitendra P. , Brian Z. 2004. Routing in multi-radio, multi-hop wireless mesh networks. Proceedings of the 10th annual international conference on Mobile computing and networking. ACM.
  • Loughney, L. , Nakhjiri. M. , Perkins . C. ,Koodli. R. 2005. Context transfer protocol (CXTP).
  • Lu S, Li L, Lam K Y, Jia L. 2009. SAODV: a MANET routing protocol that can withstand black hole attack, In:IEEE International Conference on Computational Intelligence, pp. 421-425.
  • Kassab M, Belghith A, Bonnin J, Sassi S. 2005. Fast pre-authentication based on proactive key distribution for 802. 11 infrastructure networks, In: Proceedings of the 1st ACM workshop on Wireless multimedia networking and performance modeling, pp 46-53.
  • Fu,A. , Zhang, Y. , Zhu ,Z. , Liu , X. 2010. A fast handover authentication mechanism based on ticket for IEEE 802. 16m, IEEE Communication. Letter. 14, pp. 1134–1136.
  • Xu, Li. 2014. Ticket-based handoff authentication for wireless mesh networks. " Computer Networks 73 , pp. 185-194.
  • Hill, D. W. and Lynn, J. T. , Motorola, Inc. , 2000. Adaptive system and method for responding to computer network security attacks. U. S. Patent 6,088,804.
  • Simmonds, A. , Sandilands, P. and Van Ekert, L. , 2004. An ontology for network security attacks. In Applied Computing (pp. 317-323). Springer Berlin Heidelberg.
  • Bansal, M. , Rajput, R. and Gupta, G. , 1999. Mobile ad hoc networking (MANET): Routing protocol performance issues and evaluation considerations. The internet society.
  • Huang, P. , Feldmann, A. and Willinger, W. , 2001, November. A non-instrusive, wavelet-based approach to detecting network performance problems. In Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement. pp. 213-227. ACM.
  • Cheng, C. , Riley, R. , Kumar, S. P. and Garcia-Luna-Aceves, J. J. , 1989, August. A loop-free extended Bellman-Ford routing protocol without bouncing effect. In ACM SIGCOMM Computer Communication Review Vol. 19, No. 4, pp. 224-236. ACM.
  • Bresson, E. , Chevassut, O. and Pointcheval, D. , 2001. Provably authenticated group Diffie-Hellman key exchange—the dynamic case. In Advances in Cryptology—ASIACRYPT 2001. pp. 290-309. Springer Berlin Heidelberg.