CFP last date
22 April 2024
Reseach Article

Efficient Handoff Routing (EHR) in WMN

Published on August 2016 by Geetanjali Rathee, Hemraj Saini
International Conference on Communication Computing and Virtualization
Foundation of Computer Science USA
ICCCV2016 - Number 1
August 2016
Authors: Geetanjali Rathee, Hemraj Saini
7fb7ff53-d674-4d73-bf39-ffc77ff9f49b

Geetanjali Rathee, Hemraj Saini . Efficient Handoff Routing (EHR) in WMN. International Conference on Communication Computing and Virtualization. ICCCV2016, 1 (August 2016), 29-34.

@article{
author = { Geetanjali Rathee, Hemraj Saini },
title = { Efficient Handoff Routing (EHR) in WMN },
journal = { International Conference on Communication Computing and Virtualization },
issue_date = { August 2016 },
volume = { ICCCV2016 },
number = { 1 },
month = { August },
year = { 2016 },
issn = 0975-8887,
pages = { 29-34 },
numpages = 6,
url = { /proceedings/icccv2016/number1/25599-0168/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Communication Computing and Virtualization
%A Geetanjali Rathee
%A Hemraj Saini
%T Efficient Handoff Routing (EHR) in WMN
%J International Conference on Communication Computing and Virtualization
%@ 0975-8887
%V ICCCV2016
%N 1
%P 29-34
%D 2016
%I International Journal of Computer Applications
Abstract

In WMN, handoff is a significant parameter of research. Whenever a mesh client leaves the range of serving mesh router and searches for accessing a new router based on good SNR (signal to Noise) ratio, a handoff procedure takes place. During mobility, packet transmission may enhance the number of security threats and network performance degradation issues which needs a secure routing protocol to be considered. In order to overwhelm over these hitches, this manuscript proposes a technique called Efficient Handoff Routing EHR. The suggested technique is compared and evaluated over network metrics i. e. handoff latency, throughput, end-to-end delay and packet delivery ratio. Further the approach is proved by describing a formal analysis over parameters.

References
  1. Akyildiz, I. F. , Xudong W. A survey on wireless mesh networks. 2005. In; IEEE conference on Communications Magazine, 43(9).
  2. Franklin A. A. , Murthy C. S. R. 2007. An introduction to wireless mesh networks. Security in Wireless Mesh Networks(book chapter), CRC Press,USA.
  3. Ben Salem, N. , Hubaux, J. -P. 2006. Securing Wireless Mesh Networks. In: IEEE Wireless Communication, 13(2), pp. 50-55.
  4. Amir, Yair,. 2006. Fast handoff for seamless wireless mesh networks. Proceedings of the 4th international conference on Mobile systems, applications and services. ACM.
  5. Draves, R. , Jitendra P. , Brian Z. 2004. Routing in multi-radio, multi-hop wireless mesh networks. Proceedings of the 10th annual international conference on Mobile computing and networking. ACM.
  6. Loughney, L. , Nakhjiri. M. , Perkins . C. ,Koodli. R. 2005. Context transfer protocol (CXTP).
  7. Lu S, Li L, Lam K Y, Jia L. 2009. SAODV: a MANET routing protocol that can withstand black hole attack, In:IEEE International Conference on Computational Intelligence, pp. 421-425.
  8. Kassab M, Belghith A, Bonnin J, Sassi S. 2005. Fast pre-authentication based on proactive key distribution for 802. 11 infrastructure networks, In: Proceedings of the 1st ACM workshop on Wireless multimedia networking and performance modeling, pp 46-53.
  9. Fu,A. , Zhang, Y. , Zhu ,Z. , Liu , X. 2010. A fast handover authentication mechanism based on ticket for IEEE 802. 16m, IEEE Communication. Letter. 14, pp. 1134–1136.
  10. Xu, Li. 2014. Ticket-based handoff authentication for wireless mesh networks. " Computer Networks 73 , pp. 185-194.
  11. Hill, D. W. and Lynn, J. T. , Motorola, Inc. , 2000. Adaptive system and method for responding to computer network security attacks. U. S. Patent 6,088,804.
  12. Simmonds, A. , Sandilands, P. and Van Ekert, L. , 2004. An ontology for network security attacks. In Applied Computing (pp. 317-323). Springer Berlin Heidelberg.
  13. Bansal, M. , Rajput, R. and Gupta, G. , 1999. Mobile ad hoc networking (MANET): Routing protocol performance issues and evaluation considerations. The internet society.
  14. Huang, P. , Feldmann, A. and Willinger, W. , 2001, November. A non-instrusive, wavelet-based approach to detecting network performance problems. In Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement. pp. 213-227. ACM.
  15. Cheng, C. , Riley, R. , Kumar, S. P. and Garcia-Luna-Aceves, J. J. , 1989, August. A loop-free extended Bellman-Ford routing protocol without bouncing effect. In ACM SIGCOMM Computer Communication Review Vol. 19, No. 4, pp. 224-236. ACM.
  16. Bresson, E. , Chevassut, O. and Pointcheval, D. , 2001. Provably authenticated group Diffie-Hellman key exchange—the dynamic case. In Advances in Cryptology—ASIACRYPT 2001. pp. 290-309. Springer Berlin Heidelberg.
Index Terms

Computer Science
Information Sciences

Keywords

Handoff Routing Security Ehr wmn.