Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2015, Article ID 636590, 12 pages
http://dx.doi.org/10.1155/2015/636590
Research Article

Privacy Preserved and Secured Reliable Routing Protocol for Wireless Mesh Networks

1Department of Computer Science and Engineering, Easwari Engineering College, Ramapuram, Chennai, Tamilnadu 600 089, India
2Department of Information Science and Technology, College of Engineering, Anna University, Guindy, Chennai, Tamilnadu 600 025, India

Received 25 April 2015; Accepted 3 September 2015

Academic Editor: Raffaele Bruno

Copyright © 2015 Navamani Thandava Meganathan and Yogesh Palanichamy. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. I. F. Akyildiz, X. Wang, and W. Wang, “Wireless mesh networks: a survey,” Computer Networks, vol. 47, no. 4, pp. 445–487, 2005. View at Publisher · View at Google Scholar · View at Scopus
  2. Z. Wan, K. Ren, B. Zhu, B. Preneel, and M. Gu, “Anonymous user communication for privacy protection in wireless metropolitan mesh networks,” IEEE Transactions on Vehicular Technology, vol. 59, no. 2, pp. 519–532, 2010. View at Publisher · View at Google Scholar · View at Scopus
  3. H. Lin, J. Hu, J. Ma, L. Xu, and A. Nagar, “A role based privacy-aware secure routing protocol for wireless mesh networks,” Wireless Personal Communications, vol. 75, no. 3, pp. 1611–1633, 2014. View at Publisher · View at Google Scholar · View at Scopus
  4. H. Lin, J. Ma, J. Hu, and K. Yang, “PA-SHWMP: a privacy-aware secure hybrid wireless mesh protocol for IEEE 802.11s wireless mesh networks,” Eurasip Journal on Wireless Communications and Networking, vol. 2012, article 69, 2012. View at Publisher · View at Google Scholar · View at Scopus
  5. H. A. Mogaibel and M. Othman, “Review of routing protocols and it's metrics for wireless mesh networks,” in Proceedings of the International Association of Computer Science and Information Technology—Spring Conference (IACSITSC '09), pp. 62–70, April 2009. View at Publisher · View at Google Scholar · View at Scopus
  6. M. E. M. Campista, P. M. Esposito, I. M. Moraes et al., “Routing metrics and protocols for wireless mesh networks,” IEEE Network, vol. 22, no. 1, pp. 6–12, 2008. View at Publisher · View at Google Scholar · View at Scopus
  7. M. M. E. A. Mahmoud, S. Taha, J. Misic, and X. Shen, “Lightweight privacy-preserving and secure communication protocol for hybrid Ad Hoc wireless networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 8, pp. 2077–2090, 2014. View at Publisher · View at Google Scholar · View at Scopus
  8. R. Ramya, T. M. Navamani, and P. Yogesh, “Secured identity based routing and privacy preservation in wireless mesh networks,” in Proceedings of the International Conference on Recent Trends in Information Technology (ICRTIT '11), vol. 26, pp. 521–526, Chennai, India, June 2011. View at Publisher · View at Google Scholar
  9. M. M. E. A. Mahmoud, X. Lin, and X. Shen, “Secure and reliable routing protocols for heterogeneous multihop wireless networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 26, no. 4, pp. 1140–1153, 2013. View at Publisher · View at Google Scholar
  10. Z. Wan, K. Ren, and M. Gu, “USOR: an unobservable secure on-demand routing protocol for mobile ad hoc networks,” IEEE Transactions on Wireless Communications, vol. 11, no. 5, pp. 1922–1932, 2012. View at Publisher · View at Google Scholar · View at Scopus
  11. S. Paris, C. Nita-Rotaru, F. Martignon, and A. Capone, “Cross-layer metrics for reliable routing in wireless mesh networks,” IEEE/ACM Transactions on Networking, vol. 21, no. 3, pp. 1003–1016, 2013. View at Publisher · View at Google Scholar · View at Scopus
  12. S. Khan, K.-K. Loo, N. Mast, and T. Naeem, “SRPM: secure routing protocol for IEEE 802.11 infrastructure based wireless mesh networks,” Journal of Network and Systems Management, vol. 18, no. 2, pp. 190–209, 2010. View at Publisher · View at Google Scholar · View at Scopus
  13. S. Khan, N. A. Alrajeh, and K.-K. Loo, “Secure route selection in wireless mesh networks,” Computer Networks, vol. 56, no. 2, pp. 491–503, 2012. View at Publisher · View at Google Scholar · View at Scopus
  14. D. Bansal, S. Sofat, and G. Singh, “Secure routing protocol for Hybrid Wireless Mesh Network (HWMN),” in Proceedings of the International Conference on Computer and Communication Technology (ICCCT '10), pp. 837–843, Allahabad, India, September 2010. View at Publisher · View at Google Scholar · View at Scopus
  15. Z. You and Y. Wang, “An efficient and secure routing protocol for a hybrid wireless mesh network,” Journal of Computational Information Systems, vol. 8, no. 21, pp. 8693–8705, 2012. View at Google Scholar · View at Scopus
  16. S. Khan and J. Loo, “Cross layer secure and resource-aware on-demand routing protocol for hybrid wireless mesh networks,” Wireless Personal Communications, vol. 62, no. 1, pp. 201–214, 2012. View at Publisher · View at Google Scholar
  17. S. Seth and A. Gankotiya, “Denial of service attacks and detection methods in wireless mesh networks,” in International Conference on Recent Trends in Information, Telecommunication, and Computing (ITC '10), pp. 238–240, March 2010. View at Publisher · View at Google Scholar · View at Scopus
  18. Y. Yu, Y. Peng, Y. Yu, and T. Rao, “A new dynamic hierarchical reputation evaluation scheme for hybrid wireless mesh networks,” Computers and Electrical Engineering, vol. 40, no. 2, pp. 663–672, 2014. View at Publisher · View at Google Scholar · View at Scopus
  19. J. Sun, C. Zhang, Y. Zhang, and Y. Fang, “SAT: a security architecture achieving anonymity and traceability in wireless mesh networks,” IEEE Transactions on Dependable and Secure Computing, vol. 8, no. 2, pp. 295–307, 2011. View at Publisher · View at Google Scholar · View at Scopus
  20. N. A. Kathyaini and S. Ananthakumaran, “Unconditional security based privacy protected user communication in Wireless Mesh Networks,” in Proceedings of the International Conference on Recent Advances in Computing and Software Systems (RACSS '12), pp. 201–206, Chennai, India, April 2012. View at Publisher · View at Google Scholar · View at Scopus
  21. I. R. Jeong, J. O. Kwon, and D. H. Lee, “A Diffie-Hellman key exchange protocol without random oracles,” in Cryptology and Network Security: 5th International Conference, CANS 2006, Suzhou, China, December 8–10, 2006. Proceedings, vol. 4301 of Lecture Notes in Computer Science, pp. 37–54, Springer, Berlin, Germany, 2006. View at Publisher · View at Google Scholar