Secure-GLOR: An Adaptive Secure Routing Protocol for Dynamic Wireless Mesh Networks

With the dawn of a new era, digital security has become one of the most essential part of any network. Be it a physical network, virtual network or social network, the demand for secure data transmission is ever increasing. Wireless mesh networks also stand the same test of security as the legacy networks. This paper presents a secure version of the Geo-Location Oriented Routing (GLOR) protocol for wireless mesh networks, incorporating a multilevel security framework. It implements authentication using the new features of the network model and enables encryption throughout the network to provide high levels of security.

[1]  Jinjun Chen,et al.  DLSeF , 2016, ACM Trans. Embed. Comput. Syst..

[2]  Jinjun Chen,et al.  Threats to Networking Cloud and Edge Datacenters in the Internet of Things , 2016, IEEE Cloud Computing.

[3]  Deepak Puthal Secure Data Collection and Critical Data Transmission Technique in Mobile Sink Wireless Sensor Networks , 2012 .

[4]  Deepak Puthal,et al.  Private matching and set intersection computation in multi-agent and industrial control systems , 2017, CISRC.

[5]  Jinjun Chen,et al.  A Secure Big Data Stream Analytics Framework for Disaster Management on the Cloud , 2016, 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS).

[6]  Rajiv Ranjan,et al.  SEEN: A Selective Encryption Method to Ensure Confidentiality for Big Sensing Data Streams , 2019, IEEE Transactions on Big Data.

[7]  H. Chaouchi,et al.  Security architecture in a multi-hop mesh network 1 , 2006 .

[8]  J. Thomas,et al.  Off Grid communications with Android Meshing the mobile world , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).

[9]  Philip Zimmermann,et al.  A Proposed Standard Format for RSA Cryptosystems , 1986, Computer.

[10]  Jinjun Chen,et al.  A Synchronized Shared Key Generation Method for Maintaining End-to-End Security of Big Data Streams , 2017, HICSS.

[11]  Xiangjian He,et al.  Geo-Location Oriented Routing Protocol for Smart Dynamic Mesh Network , 2016, 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS).

[12]  William M. Daley,et al.  Digital Signature Standard (DSS) , 2000 .

[13]  Simon Heron,et al.  Encryption: Advanced Encryption Standard (AES) , 2009 .

[14]  P. Cochat,et al.  Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.

[15]  Paul Gardner-Stephen,et al.  The Serval Project: Practical Wireless Ad-Hoc Mobile Telecommunications , 2011 .

[16]  W. Marsden I and J , 2012 .

[17]  Dirk Fox,et al.  Digital Signature Standard (DSS) , 2001, Datenschutz und Datensicherheit.

[18]  Priyadarsi Nanda,et al.  Building Security Perimeters to Protect Network Systems Against Cyber Threats [Future Directions] , 2017, IEEE Consumer Electronics Magazine.

[19]  Sajal K. Das,et al.  Security Issues in Wireless Mesh Networks , 2008 .

[20]  Ahmed Abukmail,et al.  Automatic Android-based Wireless Mesh Networks , 2014, Informatica.

[21]  Xiangjian He,et al.  A Secure Routing Scheme for Wireless Mesh Networks , 2016, ICISS.