scispace - formally typeset
Search or ask a question
Author

T. M. Navamani

Bio: T. M. Navamani is an academic researcher from Easwari Engineering College. The author has contributed to research in topics: Static routing & Geographic routing. The author has an hindex of 1, co-authored 2 publications receiving 6 citations.

Papers
More filters
Proceedings ArticleDOI
03 Jun 2011
TL;DR: A Secured Identity Based Routing (SIBR) scheme in which every node is assigned with the security cards for efficient authentication to reduce the number of levels at which an attack can take place by providing anonymity in routing.
Abstract: Wireless Mesh Networks (WMNs) have been expected to be the ultimate solution for the next decade wireless networking. The attractions of WMNs include easy set-up on the fly, off-the-shelf cost, flexible interoperability with other networks, and highly reliable connectivity. One main challenge in the design of these networks is their vulnerability to security attacks. The attacker will possibly be able to identify an ongoing communication session between any two network users by analyzing the network traffic pattern without knowing the user's identity information. To address these security risks, we propose a Secured Identity Based Routing (SIBR) scheme in which every node is assigned with the security cards for efficient authentication. The major goal of the proposed system is to reduce the number of levels at which an attack can take place by providing anonymity in routing. Our implementation results show that the proposed scheme increases the overall performance of the network substantially. Such a routing scheme enhances the privacy preservation of the end users. Our approach also protects against performance degradation even in the presence of malicious behavior.

5 citations

Book ChapterDOI
01 Jan 2014
TL;DR: This paper proposes Privacy Based Optimal Routing (PBOR) which provides security and user anonymity while maintaining communication efficiency in WMN and implementation results show that the proposed scheme increases the overall performance of the network substantially.
Abstract: User privacy and security have been primary concerns in Wireless Mesh Networks (WMNs) due to their peer-to-peer network topology, shared wireless medium and highly dynamic environment. Nowadays, anonymity has received increasing attention due to the users’ awareness of their privacy. Anonymity provides protection for users to enjoy network services without being traced. The multi-hop architecture of WMN lays a foundation for most of the routing attacks like packet dropping and packet misdirecting attacks. In this paper, we propose Privacy Based Optimal Routing (PBOR) which provides security and user anonymity while maintaining communication efficiency in WMN. To address privacy and anonymity, security card based routing scheme is implemented. In order to provide security against packet dropping and misdirecting attacks, strong protection is needed and it can be achieved by enhancing the routing metrics during route discovery. Although there are several schemes are proposed to defend against these attacks, there occurs more routing overhead and delay. To overcome these issues, we propose privacy based optimal routing protocol to provide an optimal path for data transmission. Our implementation results show that the proposed scheme increases the overall performance of the network substantially.

1 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: A new Privacy preserved and Secured Reliable Routing (PSRR) protocol is proposed that incorporates group signature, ID-based encryption schemes, and CLSL-DR mechanism to ensure strong privacy, security, and reliability in WMNs.
Abstract: Privacy preservation and security provision against internal attacks in wireless mesh networks (WMNs) are more demanding than in wired networks due to the open nature and mobility of certain nodes in the network. Several schemes have been proposed to preserve privacy and provide security in WMNs. To provide complete privacy protection in WMNs, the properties of unobservability, unlinkability, and anonymity are to be ensured during route discovery. These properties can be achieved by implementing group signature and ID-based encryption schemes during route discovery. Due to the characteristics of WMNs, it is more vulnerable to many network layer attacks. Hence, a strong protection is needed to avoid these attacks and this can be achieved by introducing a new Cross-Layer and Subject Logic based Dynamic Reputation (CLSL-DR) mechanism during route discovery. In this paper, we propose a new Privacy preserved and Secured Reliable Routing (PSRR) protocol for WMNs. This protocol incorporates group signature, ID-based encryption schemes, and CLSL-DR mechanism to ensure strong privacy, security, and reliability in WMNs. Simulation results prove this by showing better performance in terms of most of the chosen parameters than the existing protocols.

11 citations

Journal ArticleDOI
TL;DR: This paper develops a security architecture for authentication and attack detection in (SAAAD) WMN that provides authentication through trusted routers and detect the cloned AP attack and internal attacks.
Abstract: A wireless mesh network (WMN) consists of numerous mesh nodes. It provides effective wireless internet connectivity due to efficient network architecture where mobile end users are connected wirelessly, and higher levels are wired to avoid energy constraints, node failure, and other related issues. WMN functions efficiently in providing seamless internet access but is highly susceptible to security issues such as attack and validation failure. In Literature, there are very few works which address the attacks on both the mesh client and AP while providing authentication. This paper extends the existing work and develops a security architecture for authentication and attack detection in (SAAAD) WMN. It provides authentication through trusted routers and detect the cloned AP attack and internal attacks. Cloned AP attacks are detected by the gateways through checking the information of new joining AP against the AP database. Internal attacks are detected by the gateways using the opinions collected from mesh routers and directly observed trust values. Simulation results show that SAAAD provides better detection accuracy by reducing the computational and communication overheads.

6 citations

Journal ArticleDOI
TL;DR: By simulation results, it is shown that the proposed trust based authentication and key establishment for secure routing in WMN enhances the packet delivery ratio and resilience with reduced drop and overhead.
Abstract: In Wireless Mesh Networks (WMN), an authentication technique can be compromised due to the distributed network architecture, the broadcast nature of the wireless medium and dynamic network topology. Several vulnerabilities exist in different protocols for WMNs. Hence, in this paper, we propose trust based authentication and key establishment for secure routing in WMN. Initially, a trust model is designed based on Ant Colony Optimization (ACO) to exchange the trust information among the nodes. The routing table is utilized to select the destination nodes, for which the link information is updated and the route verification is performed. Based on the trust model, mutual authentication is applied. When a node moves from one operator to another for accessing the router, inter-authentication will be performed. When a node moves within the operator for accessing the router, then intraauthentication will be performed. During authentication, keys are established using identity based cryptography technique. By simulation results, we show that the proposed technique enhances the packet delivery ratio and resilience with reduced drop and overhead.

3 citations

Journal ArticleDOI
TL;DR: A privacy preserving protocol for secure routing in WMN, which performs a secure routing based on the security level of the nodes and generates a tri-lateral pseudonym generation method.
Abstract: In wireless mesh networks (WMN), there are possibilities of lossy links, security attacks and privacy attacks. In order to overcome these issues, in this paper, we propose a privacy preserving protocol for secure routing in WMN. In this technique, when a source node wants to transmit privacy information, it performs a secure routing based on the security level of the nodes. Also, it takes direct and delegation tickets into consideration for secure data transmission. Then, in order to authenticate the access of the mobile users, a tri-lateral pseudonym generation method is used. The mesh client registers its real identity to the operating managers and selects a secret key to generate the pseudonym. By simulation results, we show that the proposed technique enhances the network security.

3 citations

Proceedings ArticleDOI
01 Sep 2013
TL;DR: This paper proposes a framework for studying the impact of a smart attacker in a wireless mesh network that is used to provide delay-tolerant internet connectivity and sheds insights on three scenarios reflecting different intelligence levels inherited by the attacker and the defender in comparison with the equivalent settings without the attacker.
Abstract: This paper proposes a framework for studying the impact of a smart attacker in a wireless mesh network that is used to provide delay-tolerant internet connectivity. Non-cooperative game theory is used to define the defending player strategy in terms of network tree routing as well as the attacking player strategy in terms of the varying position of communication signal jammer. To evaluate the game value, the payoff is captured by the expected number of backlogged packets, based on the assumption of network of M/M/1 queues. This game is solved by the well-known method of successive average. And a preliminary experimental result has been reported on a small 2×2 grid network. The finding sheds insights on three scenarios reflecting different intelligence levels inherited by the attacker and the defender in comparison with the equivalent settings without the attacker. Finally, future work worth investigating has been given.

2 citations