Research Article

Efficient Key Management Mechanism with Trusted Gateways for Wireless Mesh Networks

Algorithm 4

Mesh router () deauthentication response message reachability.
Intput: Gateway nodes(G<-{g1,g2,g3,g4…….gn},
Routers(R<-{{}, {},……{}),),
Authentication Request Message=
Authentication Tables and router and gateway nodes public and private key pairs
flag=0 //invalid or fake request message
received by intermediate nodes (/) or destination node()
if(//)
/inpaths verifywith//intermediate nodes
   if
   flag =1
    /deletes {} in the
    /forwards signedto the next router
else if( )
verifieswith    //destination node
if()
if(arrival time at +)
   flag =1
   is isolated from the backbone mesh
else
   creates and sends a newmessage to
   through node disjoint paths(