CFP last date
22 April 2024
Reseach Article

Practical Approach For Improving Security in Wireless Mesh Network Through ECC and Two Way Authentication Scheme

Published on March 2012 by Avinash P. Wadhe, N.A.Chavhan
2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013)
Foundation of Computer Science USA
NCIPET - Number 13
March 2012
Authors: Avinash P. Wadhe, N.A.Chavhan
352299d3-9f9a-45bc-ac6c-d296cbe943af

Avinash P. Wadhe, N.A.Chavhan . Practical Approach For Improving Security in Wireless Mesh Network Through ECC and Two Way Authentication Scheme. 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013). NCIPET, 13 (March 2012), 8-14.

@article{
author = { Avinash P. Wadhe, N.A.Chavhan },
title = { Practical Approach For Improving Security in Wireless Mesh Network Through ECC and Two Way Authentication Scheme },
journal = { 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013) },
issue_date = { March 2012 },
volume = { NCIPET },
number = { 13 },
month = { March },
year = { 2012 },
issn = 0975-8887,
pages = { 8-14 },
numpages = 7,
url = { /proceedings/ncipet/number13/5287-1099/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013)
%A Avinash P. Wadhe
%A N.A.Chavhan
%T Practical Approach For Improving Security in Wireless Mesh Network Through ECC and Two Way Authentication Scheme
%J 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013)
%@ 0975-8887
%V NCIPET
%N 13
%P 8-14
%D 2012
%I International Journal of Computer Applications
Abstract

Wireless Mesh Networks (WMNs) are multi-hop and multiradio network in which each node communicates with each other to increase the performance of network and are new emerging wireless technology , potential for strengthening internet deployment and access. However, security is the main challenge in WMNs A well-performed security framework for WMNs will require to network survivability and strongly support the network growth. In this paper, we propose a secure, lightweight public key (two way authentication and Access Control based on Elliptic curve cryptography) based security scheme WMNs is to guarantee well-performed key management services and protection from unauthorized access. It is more scalable and requires less memory compared to symmetric keybased schemes. Furthermore, it is much more lightweight than other public key-based schemes such as RSA-based protocols have significant problems in terms of the bandwidth and storage requirements. Currently, the RSA algorithm requires that the key length be at least 1024 bits for long term security, however, it seems that 160 bits are sufficient for elliptic curve cryptographic functions.

References
  1. Fahad T. Bin Muhaya, King Saud University Fazl-e-Hadi AtifNaseer (2010 ), “Selfish Node Detection in Wireless Mesh Networks” . 201O International on Networking and Information Technology.
  2. Yatao Yang Ping Zeng Xinghua Yang Yina Huang (2010),“Efficient Intrusion Detection System Model in Wireless Mesh Network” Second International Conference on Networks Security, Wireless Communications and Trusted Computing
  3. Jinyuan Sun, Chi Zhang (2011), “SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks” ieee transactions on dependable and secure computing, vol. 8, no. 2,
  4. ZHAI Min, HUANG Ting-Iei (2010), “A RSA Keys harinScheme based on Dynamic Threshold Secret Sharing Algorithm for WMNs”. 978-1-4244-6837 9/10/$26.00 ©2010 IEEE
  5. M.Imani Bing He, S M.E.Rajabi M.Naderi (2010) “Vulnerabilities in network layer at Wireless Mesh Networks (WMNs) ”.International Conference on Educational and Network Technology (ICENT 2010)
  6. Bing He, Saugat Joshi, Dharma P. Agrawal (2010), “Group Key Agreement Performance in Wireless Mesh Networks”. 35th Annual IEEE Conference on Local Computer Networks LCN 2010, Denver, Colorado
  7. Andreas Noack J¨org Schwenk (2010), “Group Key Agreement Performance in Wireless Mesh Networks” 35th Annual IEEE Conference on Local Computer Networks
  8. Vipul Gupta, Douglas Stebila_, Stephen Fung Eberle “Speeding up Secure Web Transactions Using Elliptic Curve Cryptography”Sun Microsystems, Inc.2600 Casey Avenue Mountain View, CA 94043
  9. ANSI X9.63 (1999.), “Elliptic Curve Key Agreement and Key Transport Protocols”, American Bankers
  10. Li, X. Xin and Y. Hu, (2007) “Key management in ad hoc networks using self-certified public key system”, International Journal of Mobile Communications, vol. 5(1), pp. 94-106.
  11. S Mittra, “Iolus (1997,) a framework for scalable secure multicasting,” in Proceedings of ACM SIGCOMM’97, Canada, September, pp.14-18.
  12. F Lee and S. Shieh, (2004) “Scalable and Lightweight Key Distribution for Secure Group Communications,” International Journal of Network Management, 14:167-176.
  13. Y. Fu, J. He, R. Wang and G. Li, (2004) “A key-chain-based keying scheme for many-to-many secure groupCommunication,” ACM Transactions on Information and System Security (TISSEC), vol. 7(4), pp. 523 – 552.
  14. M S. Siddiqui, and C. S. Hong, (2007) “Security Issues in Wireless Mesh Networks”, Proceedings of the International Conference on Multimedia and Ubiquitous Engineering (MUE’07). New York IEEE Press, pp. 41-47.
  15. H. Mu and Y. Liu, (2006) “Mesh Based Multicast Key Management Scheme in Ad Hoc Networks,” in Proceedings of IEEE ICSP, pp.
  16. Patrick Longa, and Catherine Gebotys, “Efficient Techniques for High-Speed EllipticCurveCryptography” 2010 University of Waterloo, Canada
  17. Kossi Edoh“Elliptic Curve Cryptography on PocketPCs*” International Journal of Security and Its Applications Vol. 3, No. 3, July, 2009
  18. Darrel Hankerson, Julio Lopez Hernandez, Alfred Menezes, Software Implementation of“ Elliptic Curve Cryptography over Binary Fields”, 2000, Available at
  19. IEEE 802.16 Standard Group Web Site. Available:http://www.ieee802.org/16/
  20. IEEE Standard 802.1X-2004?(2004) “Standard for Local and Metropolitan Area Networks: Port-Based Network Access Control”, December 2004.
Index Terms

Computer Science
Information Sciences

Keywords

Elliptic curve Cryptography security two way authentication access control wireless mesh networks