Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Secure ad hoc on-demand distance vector routing
ACM SIGMOBILE Mobile Computing and Communications Review
Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
A Secure Routing Protocol for Ad Hoc Networks
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
Routing protocols in wireless mesh networks: challenges and design considerations
Multimedia Tools and Applications
Emerging standards for wireless mesh technology
IEEE Wireless Communications
ARSA: An Attack-Resilient Security Architecture for Multihop Wireless Mesh Networks
IEEE Journal on Selected Areas in Communications
Secure hybrid routing with micro/macro-mobility handoff mechanisms for urban wireless mesh networks
International Journal of Security and Networks
SRPM: Secure Routing Protocol for IEEE 802.11 Infrastructure Based Wireless Mesh Networks
Journal of Network and Systems Management
Enabling inter-PMIPv6-domain handover with traffic distributors
Journal of Network and Computer Applications
Secure route selection in wireless mesh networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
Wireless Mesh Networks (WMNs) is a rapidly progressing area of research, promising future broadband anywhere and anytime network access. WMN is anticipated to resolve the limitations of Mobile Ad hoc Networks (MANET). Secure routing in WMN still remains as an open research problem due to its special characteristics such as dedicated backbone network with static/mobile mesh clients. This paper proposes a framework that addresses: i) the application of Identity Based Cryptography (IBC) to WMN, for efficient key management and for the distribution of pair-wise shared keys among the authenticated clients; and, ii) the design of a light weight secure routing protocol for intra-domain WMN routing which protects all the fields of the routing packet against various security attacks. Security analysis shows that the proposed protocol meets the targeted security goals. Performance analysis carried out using OPNET simulation studies show that the proposed protocol adds minimal delay and communication overhead to provide security.