Ad hoc networking allows portable devices to establish communication independent of a central infrastructure. The fact that there is no central infrastructure and that the devices can move randomly gives rise to various kind of problems, such as routing and security. Attacks on routing protocols can create various undesirable effects that defeat the objectives of ad-hoc routing, Ad hoc networks is much more vulnerable to malicious exploits than a wired network. Secure communication is an important aspect of any network environment. Therefore to provide secure ad hoc network: authentication, confidentiality, integrity, non repudiation and access control should be provided. Authentication comes in the first place to ensure secure network operation, since other services depend on the authentication of communication entities. In mobile ad hoc, there is possibility of nodes being compromise, therefore, the network should not have any central control but instead have distributed architecture; when avoiding central control it's more difficult to implement authentication protocol. In this paper, the recently developed identity based scheme with threshold secret sharing will be used in two different scenarios; in the first scenario the serving nodes have been assumed fixed nodes, in the second scenario the serving nodes have been assumed mobile nodes. The purpose of applying this scheme is to provide authentication, confidentiality, reduce computation cost, avoiding central control and find out the proper threshold value. The authentication protocol has been implemented, tested and compared with central serving control using computer simulator method. The simulator that has been used to simulate the ad hoc authentication protocol is a self developed simulator.
Abstract-Routing is a fundamental characteristic of Wireless Mesh Network (WMN). The strengths and weakness of routing protocols are reflected directly in WMN's characteristics. Several advantages of WMNs over competing technologies are directly enable by the routing protocols. WMNs require routing protocols that provide flexibility to work with different topologies, low latency for route (re-) discovery, low control traffic overhead, scalability with respect to mobility and network dimension, mobile user support, efficient handover, QoS support, multicast which is important for emergency response cases and more desirable one -multipaths. In this paper, a survey on some of the relevant routing protocols for WMNs, their behavior, and comparison is presented.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.