Full Paper View Go Back

A Novel Security Based Model for Wireless Mesh Networks

Shivlal Mewada1 , Umesh Kumar Singh2 , Pradeep Sharma3

Section:Research Paper, Product Type: Journal
Vol.1 , Issue.1 , pp.11-15, Apr-2013

Online published on Apr 30, 2013


Copyright © Shivlal Mewada, Umesh Kumar Singh , Pradeep Sharma . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Shivlal Mewada, Umesh Kumar Singh , Pradeep Sharma, “A Novel Security Based Model for Wireless Mesh Networks,” International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.1, pp.11-15, 2013.

MLA Style Citation: Shivlal Mewada, Umesh Kumar Singh , Pradeep Sharma "A Novel Security Based Model for Wireless Mesh Networks." International Journal of Scientific Research in Network Security and Communication 1.1 (2013): 11-15.

APA Style Citation: Shivlal Mewada, Umesh Kumar Singh , Pradeep Sharma, (2013). A Novel Security Based Model for Wireless Mesh Networks. International Journal of Scientific Research in Network Security and Communication, 1(1), 11-15.

BibTex Style Citation:
@article{Mewada_2013,
author = {Shivlal Mewada, Umesh Kumar Singh , Pradeep Sharma},
title = {A Novel Security Based Model for Wireless Mesh Networks},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {4 2013},
volume = {1},
Issue = {1},
month = {4},
year = {2013},
issn = {2347-2693},
pages = {11-15},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=25},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=25
TI - A Novel Security Based Model for Wireless Mesh Networks
T2 - International Journal of Scientific Research in Network Security and Communication
AU - Shivlal Mewada, Umesh Kumar Singh , Pradeep Sharma
PY - 2013
DA - 2013/04/30
PB - IJCSE, Indore, INDIA
SP - 11-15
IS - 1
VL - 1
SN - 2347-2693
ER -

5054 Views    4399 Downloads    4310 Downloads
  
  

Abstract :
Wireless mesh network (WMN) is a new emerging field with its potential applications in extremely unpredictable and dynamic environments. WMN has the feather of self-organization, distributed structure. WMN is going to address the internet provision to users at low cost anytime from anywhere, as it allows a fast, easy and inexpensive network deployment. However, they are far from mature for large-scale deployment in some applications due to the lack of the satisfactory guarantees on security. In the wireless mesh networks, management model is one of the most important secure problems. We propose a security based model for wireless mesh network which be adapted by large groups according to network characteristics.

Key-Words / Index Term :
WMNs; MANET; Security; Security model; Protocols

References :
[1]. Naouel Ben Salem and Jean-Pierre Hubaux, EPFL,” securing wireless mesh networksIEEE wireless communication magazine .April 2006.
[2]. Umesh Kumar Singh, Shivlal Mewada, “Security Issues & Challenges in Wireless Mesh Networks”, International Journal of Advanced Research in computer Science (IJARCS), Volume-2, No.5, pp(301-304), September-October 2011
[3]. Mewada Shivlal and Umesh Kumar Singh, “Performance Analysis of Secure Wireless Mesh Networks”, Research Journal of Recent Sciences, Vol. 1(3), pp(80-85), March- 2012.
[4]. Umesh Kumar Singh, Shivlal Mewada, Lokesh Laddhani, “Distributed Architecture for Backbone Area Security of Wireless Mesh Networks”, International Journal of Advanced Research in computer Science(IJARCS), Volume-2, No.3, pp(191-195), May-June 2011.
[5]. I. Akyildiz and X. Wang, “A survey on wireless mesh networks,” IEEE Communications Magazine, vol. 43, no. 9, pp. 23–30, 2005.
[6]. R. Anderson and M. Kuhn. “Tamper Resistance - a Cautionary Note”. In the USENIX Association in Proc. of the 2nd Workshop on Electronic Commerce, Oakland, California, Nov. 18-20, 1996.
[7]. Muhammad Shoaib Siddiqui, Choong Seon Hong, “Security Issues in Wireless Mesh Networks”, Int. Conference on Multimedia and Ubiquitous Eng(2007), pp(717 - 722) IEEE Computer society.
[8]. A. Seshadri, A. Perrig, L. van Doorn, and P. Khosla. Swatt: Software-based attestation for embedded devices. In IEEE Symposium on Security and Privacy, 2004.
[9]. Y. Zhang, Y.; Fang. ARSA: An attack-resilient security architecture for multihop wireless mesh networks. In IEEE Journal on Selected Areas in Comm., vol 24, pages 1916–1928, Oct. 2006.
[10]. William Stallings, “Network Security Essentials”, Third Edition, Prentice Hall, July 2006.
[11]. F Lee and S. Shieh, “Scalable and Lightweight Key Distribution for Secure Group Communications,” International Journal of Network Management, 14:167-176, 2004.
[12]. Y. Fu, J. He, R. Wang and G. Li, “A key-chain-based keying scheme for many-to-many secure group comm,”ACM Transactions on Information and System Security, 2004, vol. 7(4), pp. 523 – 552.
[13]. K. Lu, Y. Qian and J. Hu, “A framework for distributed key management schemes in heterogeneous wireless sensor networks,” 25thIEEE International Conference on Performance, Computing, and Comm. (IPCCC), pp. 513-519, Arizona, USA, April 10-12, 2006.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.

Impact Factor

Journals Contents

Information

Downloads

Digital Certificate

Go to Navigation