CFP last date
20 January 2025
Reseach Article

STI Protocol Design to Improve the Security over Multi-hop Networks

by Srinivasan J., Audithan S.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 130 - Number 11
Year of Publication: 2015
Authors: Srinivasan J., Audithan S.
10.5120/ijca2015907117

Srinivasan J., Audithan S. . STI Protocol Design to Improve the Security over Multi-hop Networks. International Journal of Computer Applications. 130, 11 ( November 2015), 16-18. DOI=10.5120/ijca2015907117

@article{ 10.5120/ijca2015907117,
author = { Srinivasan J., Audithan S. },
title = { STI Protocol Design to Improve the Security over Multi-hop Networks },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 130 },
number = { 11 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 16-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume130/number11/23253-2015907117/ },
doi = { 10.5120/ijca2015907117 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:25:39.251640+05:30
%A Srinivasan J.
%A Audithan S.
%T STI Protocol Design to Improve the Security over Multi-hop Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 130
%N 11
%P 16-18
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless communication is very extensively used in the current world and we are rapidly moving to a hands-free swift world. Even with the arrival of advancements at such a rate in the wireless world, The Wireless Mesh Networks generally uses the AODV routing protocols to handle the traffic flow in the Mesh network. But our proposed routing protocol can securely discover the route between the pair of nodes in the Wireless Mesh Network. In this, we are utilizing Polynomial bi variate key pre distribution scheme to provide authentication and security. In this scenario each node is assigned with random key. In this paper, we present a simple and efficient method for secure traversal of information across the network through multiple intermediate hops in the network. The proposed scheme is evaluated by using the Network Simulator (NS2).

References
  1. F. Akyildiz, X. Wang, and W. Wang, “Wireless mesh networks: A survey,” Computer Networks, vol. 47, no. 4, pp. 445-487, 2005.
  2. PERKINS, P. BHAGWAT “Highly Dynamic Destination-Sequenced Distance Vector (DSDV)for Mobile Computers” Proc. of the SIGCOMM 1994 Conference on CommunicationsArchitectures, Protocols and Applications, Aug 1994, pp 234–244.
  3. Guangyu Pei and Mario Gerla and Xiaoyan Hong AND Ching-Chuan Chiang, “A WirelessHierarchical Routing Protocol with Group Mobility” , IEEE WCNC'99, New Orleans, USA,September 1999.
  4. K. Sangiri and B. Dahil, “A secure routing protocol for ad hoc networks,” Proceedings of 10thIEEE International Conference on Network Protocols, pp. 78-89, 2002.
  5. Y C. Hu, A. Perrig, and D. B. Johnson, “Ariadne: A secure on-demand routing protocol for adhoc networks,” Proceedings of MobiCom, pp. 21-38, Atlanta, GA, Sep. 2002.
  6. M. Zapata and N. Asokan, “Securing ad-hoc routing protocols,” Proceedings of ACMWorkshop on Wireless Security, pp. 1-10, Sep. 2002.
  7. Ghanbari, P, “HWMP path selection protocol based on learning automata for Wireless MeshNetworks” Application of Information and Communication Technologies (AICT), Oct. 2011.
  8. Sonia Waharte & Raouf Boutaba & Youssef Iraqi & Brent Ishibashi, “Routing protocols in wireless mesh networks: challenges and design considerations” Multimed Tools Appl (2006)29: 285–303.
  9. H. Hassanein and A. Zhou, “Routing with load balancing in wireless Ad hoc networks,”Proceedings of ACM MSWiM, pp. 89-96, 2001.
  10. Y C. Hu, A. Perrig, and D. B. Johnson, “Ariadne: A secure on-demand routing protocol for ad hoc networks,” Proceedings of MobiCom, pp. 21-38, Atlanta,GA, Sep. 2002.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Mesh Network Routing metrics i.e. ETX CAB Routing protocol.