CFP last date
20 January 2025
Reseach Article

An Efficient Key Management Scheme with Key Agreement to Mitigate Malicious Attacks for Wireless Mesh Network

by Vijay H. Kalmani, Sojwal S. Kulkarni Alias R.m.jogadand, H. M. Rai
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 56 - Number 6
Year of Publication: 2012
Authors: Vijay H. Kalmani, Sojwal S. Kulkarni Alias R.m.jogadand, H. M. Rai
10.5120/8898-2924

Vijay H. Kalmani, Sojwal S. Kulkarni Alias R.m.jogadand, H. M. Rai . An Efficient Key Management Scheme with Key Agreement to Mitigate Malicious Attacks for Wireless Mesh Network. International Journal of Computer Applications. 56, 6 ( October 2012), 38-42. DOI=10.5120/8898-2924

@article{ 10.5120/8898-2924,
author = { Vijay H. Kalmani, Sojwal S. Kulkarni Alias R.m.jogadand, H. M. Rai },
title = { An Efficient Key Management Scheme with Key Agreement to Mitigate Malicious Attacks for Wireless Mesh Network },
journal = { International Journal of Computer Applications },
issue_date = { October 2012 },
volume = { 56 },
number = { 6 },
month = { October },
year = { 2012 },
issn = { 0975-8887 },
pages = { 38-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume56/number6/8898-2924/ },
doi = { 10.5120/8898-2924 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:58:11.189404+05:30
%A Vijay H. Kalmani
%A Sojwal S. Kulkarni Alias R.m.jogadand
%A H. M. Rai
%T An Efficient Key Management Scheme with Key Agreement to Mitigate Malicious Attacks for Wireless Mesh Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 56
%N 6
%P 38-42
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the recent times the IT industry has been witnessing rapid development in wireless communication technologies such as 3 G, 4 G, etc. Wireless Mesh Network is one such promising wireless communication technology which provides high bandwidth internet connectivity in a sizable geographic area at a much lower cost than with classic WiFi networks. WMN consists of wireless entities such as Mesh Routers (MRs), Mesh Clients (MCs), Internet Gateways (IGs) are organized in an arbitrary mesh topology and form the wireless mesh back bone. Due to the mobility of the Mesh Clients, great challenges arise in securing the WMNs from various kinds of attacks. In this work a security mechanism is presented to ensure that induced network is connected and well protected from potential eaves dropping attacks, and this is accomplished by introducing an efficient key management scheme with key agreement. The simulation results show that the scheme implemented in this work, out performs previous schemes thus providing a network that is resistant against malicious eavesdropping attack.

References
  1. Farah Kandah, Weiyi Zhang, Xiaojiang Du, Yashaswi Singh, A Secure Key management Scheme in Wireless Mesh Networks, Communications (ICC), 2011 IEEE International Conference, June 2011.
  2. I. F. Akyildiz, X. Wang, W. Wang, Wireless mesh networks: a survey; Elsevier Journal of Computer Networks, vol. 47, Issue. 4, pp. 445-487, 2005.
  3. N. Asokan, P. Ginzboorg, Key Agreement in Ad Hoc Networks; Computer Communications, vol. 23, pp. 1627-1637, 2000.
  4. M. Cagalj, J. Hubaux, C. Enz, Minimum-energy broadcast in all-wireless networks: NP-completeness and distribution issues; ACM MobiCom'02, Atlanta, Georgia, USA.
  5. S. P. Chan, R. Poovendran, M. T. Sun, A key management scheme in distributed sensor networks using attack probabilities; IEEE GLOBECOM' 05, vol. 2, pp. 5, St. Louis, MO, USA.
  6. X. Du, Y. Xiao, M. Guizani, H. H. Chen, An effective key management scheme for heterogeneous sensor networks; Ad Hoc Networks, Special Issues in Sensor and Ad Hoc Networks, vol. 5, Issue. 1, pp. 24-34, 2007.
  7. L. Eschenauer, V. D. Gligor, A key-management scheme for distributed sensor networks; ACM CCS'02, Washington, DC, USA.
  8. P. Loree, K. Nygard, X. Du, An efficient post-deployment key establishment scheme for heterogeneous sensor networks; IEEE GLOBECOM'09, Honolulu, Hawaii, USA.
  9. A. Raniwala, T. Chiueh, Architecture and algorithms for an IEEE 802. 11- based multi-channel wireless mesh network; IEEE INFOCOM'05, vol. 3, pp. 2223- 2234, Miami, Fl. , USA.
  10. A. Raniwala, K. Gopalan, T. Chiueh, Centralized channel assignment and routing algorithms for multi-channel wireless mesh networks; ACM MobiCom'04, Vol. 8, Issue. 2, pp. 50-65, Philadelphia, PA, USA.
  11. J. Shi, R. Zhang, and Y. Zhang, Secure range queries in tiered sensor networks; IEEE INFOCOM'09, pp. 945-953, Rio de Janeiro, Brazil.
  12. J. Tang, G. Xue, W. Zhang, Interference-Aware Topology Control and QoS Routing in Multi-Channel Wireless Mesh Networks; ACM Mobi-Hoc'05, pp. 68-77, Urbana-champaign, IL, USA.
  13. W. Zhang, F. Kandah, J. Tang, K. Nygard, Interference-Aware Robust Topology Design in Multi-Channel Wireless Mesh Networks; IEEE CCNC'10, pp. 6-10, LAS Vegas, NV, USA.
  14. X. Zhao, Y. Lv, T. H. Yeap, B. Hou, A Novel Authentication and Key Agreement Scheme for Wireless Mesh Networks; In Proceedings of NCM'09, pp. 471-474, Washington, DC, USA.
  15. Dr. M. S. Aswal, Paramjeet Rawat, Tarun Kumar, Threats and Vulnerabilities in Wireless Mesh Networks, International Journal of Recent Trends in Engineering, Vol 2, No. 4, November 2009
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Mesh Network Efficient Key management Scheme malicious eaves dropping