CFP last date
22 April 2024
Reseach Article

A Ticket based Security Framework for Fast Transmission in Wireless Mesh Network

Published on April 2017 by Priyanka Patel, Abhay Kothari
National Conference on Contemporary Computing
Foundation of Computer Science USA
NCCC2016 - Number 1
April 2017
Authors: Priyanka Patel, Abhay Kothari
835f20a8-ceba-486e-940b-65859fcfa742

Priyanka Patel, Abhay Kothari . A Ticket based Security Framework for Fast Transmission in Wireless Mesh Network. National Conference on Contemporary Computing. NCCC2016, 1 (April 2017), 1-4.

@article{
author = { Priyanka Patel, Abhay Kothari },
title = { A Ticket based Security Framework for Fast Transmission in Wireless Mesh Network },
journal = { National Conference on Contemporary Computing },
issue_date = { April 2017 },
volume = { NCCC2016 },
number = { 1 },
month = { April },
year = { 2017 },
issn = 0975-8887,
pages = { 1-4 },
numpages = 4,
url = { /proceedings/nccc2016/number1/27332-6301/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Contemporary Computing
%A Priyanka Patel
%A Abhay Kothari
%T A Ticket based Security Framework for Fast Transmission in Wireless Mesh Network
%J National Conference on Contemporary Computing
%@ 0975-8887
%V NCCC2016
%N 1
%P 1-4
%D 2017
%I International Journal of Computer Applications
Abstract

In recent years, Wireless Mesh Network (WMN) has been emerged out as the next generation of wireless communication networks due to its economical feature in the era of broadband services it supports. However, security issues inherent in WMNs or any wireless networks needed to be considered before the deployment of such networks, since it is disagreeable to subscribers to acquire services without the assurance of security and privacy. Wireless security has become the hot are in the literature for diverse network technologies such as ad hoc networks, cellular networks, local area networks and sensor networks etc. On the other hand, the network authority necessitates the provisional anonymity such that all the misbehaving entities in the network remain traceable. This paper introduces a ticket based security framework to make sure the unconditional anonymity for honest users and traceability of misbehaving users. The proposed architecture strives to resolve the divergence between the anonymity and traceability, in addition to ensuring these objectives it also pledges the fundamental security requirements by providing the location privacy and without relying on the central authority.

References
  1. W. Lou and Y. Fang, A Survey on Wireless Security in Mobile Ad Hoc Networks: Challenges and Possible Solutions, edited by X. Chen, X. Huang and D. -Z. Du, Kluwer Academic Publishers/Springer, 2004.
  2. L. Zhou and Z. J. Haas, "Securing ad hoc networks," IEEE Network Magazine, vol. 13, no. 6, pp. 24–30, Dec. 1999.
  3. M. Raya and J-P. Hubaux, "Securing vehicular ad hoc networks," Journal of Computer Security, Special Issue on Security of Ad Hoc and Sensor Networks, vol. 15, no. 1, pp. 39–68, 2007.
  4. P. Kyasanur and N. H. Vaidya, "Selfish MAC layer misbehavior in wireless networks," IEEE Trans. Mobile Computing, vol. 4, no. 5, pp. 502–516, Sept. 2005.
  5. A. Perrig, J. Stankovic, and D. Wagner, "Security in wireless sensor networks," Comm. of the ACM, vol. 47, no. 6, pp. 53–57, 2004.
  6. S. Zhu, S. Setia, and S. Jajodia, "LEAP+: Efficient security mechanisms for large-scale distributed sensor networks," ACM Trans. Sensor Networks, vol. 2, no. 4, pp. 500–528, Nov. 2006.
  7. S. Brands, "Untraceable off-line cash in wallets with observers," in Proc. CRYPTO'93, 13th Annual Int'l Cryptology Conf. on Advances in Cyptology, pp. 302–318, Aug. 1993.
  8. K. Wei, Y. R. Chen, A. J. Smith, and B. Vo, "Whopay: A scalable and anonymous payment system for peer-to-peer environments," Proc. IEEE Intl. Conf. on Distributed Computing Systems, ICDCS, July 2006.
  9. D. Figueiredo, J. Shapiro, and D. Towsley, "Incentives to promote availability in peer-to-peer anonymity systems," in Proc. IEEE Int'l Conf. on Network Protocols, ICNP, pp. 110–121, Nov. 2005.
  10. D. Chaum, Blind signatures for untraceable payments, Advances in Cryptology - Crypto '82, pp. 199-203, Springer-Verlag, 1982.
  11. Priyanka Patel and Abhay Kothari. A Brief Review on Security and Privacy Issues in Wireless Mesh Networks. International Journal of Computer Applications 144(4):6-9, June 2016.
  12. A. O. Durahim, E. Sava?, "A-MAKE: An Efficient, Anonymous and Accountable Authentication Framework for WMNs", In the Proceedings of the 5th International Conference on Internet Monitoring and Protection (ICIMP), Barcelona, Spain, 2010, pp. 54-59.
  13. D. Bansal, S. Sofat, and A. K. Gankotiya, "Selfish MAC Misbehaviour Detection in Wireless Mesh Networks", In the Proceedings of 2010 International Conference on Advances in Computer Engineering (ACE 2010), Bangalore, Karnataka, India, 2010, pp. 130-133.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Mesh Network (wmn) Security Requirements Authentication Anonymity Trusted Authority Etc.