An Authenticated Trust Based Security Mechanism for Video Transmission in Wireless Mesh Networks

被引:1
|
作者
Loret, J. B. Shajilin [1 ]
Kumar, T. Ganesh [2 ]
机构
[1] Francis Xavier Engn Coll, Dept Informat Technol, Tirunelveli, India
[2] Galgotias Univ, Sch Comp Sci & Engn, Greater Noida, India
来源
JOURNAL OF INTERNET TECHNOLOGY | 2021年 / 22卷 / 04期
关键词
Wireless mesh networks; Secure routing; Trust value; IDDES; Fuzzy; SENSOR NETWORKS; ROUTING PROTOCOL; MANAGEMENT;
D O I
10.53106/160792642021072204004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently Wireless mesh networks (WMNs) have emerged as a key technology to meet the challenges in multimedia networks. Mostly the WMN are multi-hop in nature and in order to achieve availability, the routing protocols must be robust against both dynamically changing topology and malevolent attacks. In WMN, Security is one of the primary concerns due to the open nature and to ensure security in wireless mesh network (WMN) is a critical issue. To address the security vulnerabilities, though several secure routing protocols have been proposed but still there exist problems. In order to overcome this, a Secured Optimal Trusted Multipath Routing Protocol (SOTMRP) using fuzzy is proposed which is an extension of our previous work that improves the security in path selection. To ensure security in video transmission an Improved Dynamic DES algorithm (IDDES) is proposed and also to authenticate the destination an authenticated 3-way hand shaking mechanism is implemented in our system. The Simulation results show that the secured SOTMRP outperform well than other trust models by considering the various parameters such as Average throughput, Packet Delivery Ratio, Energy consumption, Trust value computation and Control Overhead.
引用
收藏
页码:757 / 764
页数:8
相关论文
共 50 条
  • [21] Multipath Routing over Wireless Mesh Networks For Multiple Description Video Transmission
    Rong, Bo
    Qian, Yi
    Lu, Kejie
    Hu, Rose Qingyang
    Kadoch, Michel
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2010, 28 (03) : 321 - 331
  • [22] Security Framework for Hybrid Wireless Mesh Protocol in Wireless Mesh Networks
    Avula, Mallikarjun
    Lee, Sang-Gon
    Yoo, Seong-Moo
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (06): : 1982 - 2004
  • [23] Adaptive QoS and Security for Video Transmission over Wireless Networks: A Cognitive-Based Approach
    Abdallah, Walid
    Lee, Suk Kyu
    Kim, Hwagnam
    Boudriga, Noureddine
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2014, PT I, 2014, 8630 : 138 - 151
  • [24] Available trust and security in wireless networks
    Daskapan, S.
    Van Bergen, J. J.
    Kaart, M.
    2006 IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1-3, 2006, : 1100 - +
  • [25] An identity-based security architecture for Wireless Mesh Networks
    Li, Guangsong
    2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 223 - 226
  • [26] Trust Based Authentication Mechanism in Wireless Sensor Networks
    Li, Ru-ping
    INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2016, 12 (01) : 58 - 63
  • [27] A statistical trust system in wireless mesh networks
    Khatoun, Rida
    Begriche, Youcef
    Dromard, Juliette
    Khoukhi, Lyes
    Serhrouchni, Ahmed
    ANNALS OF TELECOMMUNICATIONS, 2016, 71 (5-6) : 187 - 199
  • [28] A statistical trust system in wireless mesh networks
    Rida Khatoun
    Youcef Begriche
    Juliette Dromard
    Lyes Khoukhi
    Ahmed Serhrouchni
    Annals of Telecommunications, 2016, 71 : 187 - 199
  • [29] Protection based on neighborhood-trust in clustered wireless mesh networks
    Samad, Fahad
    Makram, Sadeq Ali
    NGMAST 2009 - 3rd International Conference on Next Generation Mobile Applications, Services and Technologies, 2009, : 487 - 493
  • [30] Protection based on Neighborhood-Trust in Clustered Wireless Mesh Networks
    Samad, Fahad
    Makram, Sadeq Ali
    THIRD INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES, AND TECHNOLOGIES, PROCEEDINGS, 2009, : 487 - 493