Research Article
Efficient Key Management Mechanism with Trusted Gateways for Wireless Mesh Networks
Algorithm 4
Mesh router (
) deauthentication response message reachability.
Intput: Gateway nodes(G<-{g1,g2,g3,g4…….gn}, | Routers(R<-{{}, {},……{}),), | Authentication Request Message= | Authentication Tables and router and gateway nodes public and private key pairs | flag=0 //invalid or fake request message | received by intermediate nodes (/) or destination node() | if(//) | /inpaths verifywith//intermediate nodes | if | flag =1 | /deletes {} in the | /forwards signedto the next router | else if( ) | verifieswith //destination node | if() | if(arrival time at +) | flag =1 | is isolated from the backbone mesh | else | creates and sends a newmessage to | through node disjoint paths( |
|