Efficient Authentication Scheme with Reduced Response Time and Communication Overhead in WMN

Efficient Authentication Scheme with Reduced Response Time and Communication Overhead in WMN

Copyright: © 2018 |Pages: 12
DOI: 10.4018/IJISP.2018040102
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Recently, Wireless Mesh Network is deliberated as a significant technology due to its self-healing, self-configuring and self-organizing features. The Multi-hop nature of WMN nodes has the potential to forward the data traffic to their intended destination node without the involvement of source node. One of the factors that impact the WMN performance is secure communication process. Various secure authentication mechanisms have been projected however, authentication delay and communication overheads are listed as the main security issues of these approaches. In this article, an efficient and fast authentication protocol have been proposed to reduce the response time, computation overhead during encryption/decryption process of the routing messages. Further various simulations with erratic nodes have been conducted to endorse the enhancement of proposed solution against existing protocols. Moreover, performance comparison between existing and proposed schemes have been analyzed in detail showing that proposed approach has achieved better outcome against convinced consequences.
Article Preview
Top

Introduction

Self-healing, self-configuring and self-organizing characteristics of Wireless Mesh Network (WMN) (Akyildiz & Wang, 2005; Khan & Pathan, 2013) makes it as a key technology of next generation. There exist three kinds of WMN architectures consisting of 2 sorts of nodes; Mesh Clients (MC) and Mesh Routers (MR). Mesh routers act as a backbone that is used to forward the data traffic to the destination node while MCs are the endpoint devices which utilizes the network services. Due to its dynamic and broadcasting nature, WMN has become the focus of research to increase the coverage range with easy deployment nature (Wu et al., 2016; Sbeiti et al., 2016; Kas et al., 2012). Security (Rathee & Saini, 2016; Shams & Rizaner, 2014; Chen et al., 2016; Khan et al., 2012; Rathee & Saini, 2016) in WMN is a challenging issue, since the mesh clients are unstable and intrinsic malicious nodes may cause various perilous attacks (i.e. DoS, Sybil attack) by limiting the network performance metrics (Su, 2011; Tseng et al., 2011; Akilarasu & Shalinie, 2016). Several authentication protocols (Henriquez & Jimenez, 2016; Li et al., 2013; Fan et al., 2013) have been proposed in the literature by considering the characteristics of WMN. Numerous cryptosystem techniques are used to provide the security and can be categorized into two different categories; symmetric and public key based scheme. In symmetric key based (Watanabe et al., 2017; Zhang et al., 2006) scheme, a single key is used to provide the security where a third party is involved to prove the public key authenticity between source and destination whereas in public key (Umamaheswari et al., 2015; Bruno et al., 2005) cryptosystem that is also called asymmetric technique, the trust relationship is established without the involvement of third party.

PANA (Ohba et al, 2008), LHAP (Zhu et al., 2006) and AKES (He et al., 2010) are some authentication techniques to provide the security inside the network. PANA is a method that is deployed to authenticate the clients in order to access the network using IP based protocols while LHAP is a one-way hash chain which is used for authenticating the data packets. AKES proposed by the author Aboba is a distributed hierarchical technique based on multi capricious symmetric function. In this, a polynomial based key distribution model is used in which individual equations are distributed by the servers to their clients. The foremost limitation with all these previous approaches is the communication overhead. A significant communication overhead may cause perilous attacks and increase the traffic congestion inside the network. A security technique having significant message transmission between source and destination may cause certain types of intrinsic or extrinsic attacks. Therefore, it is required to define an authentication technique which takes less processing (encryption/decryption) time.

In this manuscript a technique is proposed whose aim is to overcome the communication overhead by reducing the response and evaluation timing of the technique. A technique having fast response and less evaluation time may strengthen the security mechanism inside the network.

Complete Article List

Search this Journal:
Reset
Volume 18: 1 Issue (2024)
Volume 17: 1 Issue (2023)
Volume 16: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 15: 4 Issues (2021)
Volume 14: 4 Issues (2020)
Volume 13: 4 Issues (2019)
Volume 12: 4 Issues (2018)
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing