Research Article
Efficient Key Management Mechanism with Trusted Gateways for Wireless Mesh Networks
Algorithm 2
Mesh router (
) authentication replay message reachability.
Intput: Gateway nodes(G<-{g1,g2,g3,g4…….gn}, | Routers(R<-{{}, {},……{}),), | Authentication Request Message= | Authentication Tables and router and gateway nodes public and private key pairs | flag =0 //invalid or fake reply messages | | if | /inpaths verifieswith//intermediate nodes | if | flag =1 | /add new router {} in the | /forwards signedto the next router | else if( ) | verifieswith//destination node | if() | if(arrival time at +) | flag =1 | is successfully joined in backbone mesh | else if | flag =1 | sends newin backbone mesh | mesh routers drop {, } from their corresponding authentication table | if(flag=0) //intermediate nodes and destination node | |
|