Performance Comparison between IBC-HWMP and Hash-HWMP

In this paper we have implemented the Hash technique to provide security in HWMP (Hybrid Wireless Mesh Protocol). Then after, we compared the Hash based HWMP against IBC (Identity Based Cryptography) based HWMP. This study has been carried out to show the great benefits of the IBC technique in securing HWMP. Results have shown that, IBC-HWMP outperforms the hash-based HWMP in terms of overhead and delay. According to the obtained results the use of IBC with HWMP provides a greate level of security with light overhead.

[1]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[2]  Panagiotis Papadimitratos,et al.  Secure link state routing for mobile ad hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[3]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.

[4]  Phung Huu Phu,et al.  Securing AODV Routing Protocol in Mobile Ad-Hoc Networks , 2009, IWAN.

[5]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[6]  Choong Seon Hong,et al.  SHWMP: A Secure Hybrid Wireless Mesh Protocol for IEEE 802.11s Wireless Mesh Networks , 2009, Trans. Comput. Sci..

[7]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[8]  Guangsong Li An Identity-Based Security Architecture for Wireless Mesh Networks , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).

[9]  Yih-Chun Hu,et al.  Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.

[10]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[11]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[12]  Charles E. Perkins,et al.  Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.

[13]  Jalel Ben-Othman,et al.  On Securing HWMP Using IBC , 2011, 2011 IEEE International Conference on Communications (ICC).

[14]  Alfred Menezes,et al.  Elliptic Curves and Cryptography , 1999 .

[15]  Futai Zou,et al.  A Survey on Security in Wireless Mesh Networks , 2010 .

[16]  Celia Li,et al.  Secure Routing for Wireless Mesh Networks , 2011, Int. J. Netw. Secur..