Efficient Authentication Scheme with Reduced Response Time and Communication Overhead in WMN

Efficient Authentication Scheme with Reduced Response Time and Communication Overhead in WMN

Copyright: © 2018 |Volume: 12 |Issue: 2 |Pages: 12
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781522543077|DOI: 10.4018/IJISP.2018040102
Cite Article Cite Article

MLA

Rathee, Geetanjali, and Hemraj Saini. "Efficient Authentication Scheme with Reduced Response Time and Communication Overhead in WMN." IJISP vol.12, no.2 2018: pp.26-37. http://doi.org/10.4018/IJISP.2018040102

APA

Rathee, G. & Saini, H. (2018). Efficient Authentication Scheme with Reduced Response Time and Communication Overhead in WMN. International Journal of Information Security and Privacy (IJISP), 12(2), 26-37. http://doi.org/10.4018/IJISP.2018040102

Chicago

Rathee, Geetanjali, and Hemraj Saini. "Efficient Authentication Scheme with Reduced Response Time and Communication Overhead in WMN," International Journal of Information Security and Privacy (IJISP) 12, no.2: 26-37. http://doi.org/10.4018/IJISP.2018040102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Recently, Wireless Mesh Network is deliberated as a significant technology due to its self-healing, self-configuring and self-organizing features. The Multi-hop nature of WMN nodes has the potential to forward the data traffic to their intended destination node without the involvement of source node. One of the factors that impact the WMN performance is secure communication process. Various secure authentication mechanisms have been projected however, authentication delay and communication overheads are listed as the main security issues of these approaches. In this article, an efficient and fast authentication protocol have been proposed to reduce the response time, computation overhead during encryption/decryption process of the routing messages. Further various simulations with erratic nodes have been conducted to endorse the enhancement of proposed solution against existing protocols. Moreover, performance comparison between existing and proposed schemes have been analyzed in detail showing that proposed approach has achieved better outcome against convinced consequences.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.