Please use this identifier to cite or link to this item:
http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/7708
Title: | Secure Message Transmission during Handoff in Wireless Mesh Networks |
Authors: | Thakur, Pankaj Saklani, Pragya Chakshoo Rathee, Geetanjali [Guided by] |
Keywords: | Wireless mesh networking Secure message transmission Handoff |
Issue Date: | 2019 |
Publisher: | Jaypee University of Information Technology, Solan, H.P. |
Abstract: | Wireless Mesh Networking (WMN) is regarded as a promising key technology of the next generation. This is attractive or absurdly expensive in areas where the infrastructure already exists for its multi-hop, self-healing, self-organizing and dynamic properties. Progress in Network technologies have enabled companies to use the network for more than just sharing. resources, but also to store a large amount of data for analysis. Therefore, the security of this data is very high Whenever an MC moves outside the limits of your current service mesh router, thenthe corresponding signal-to-noise ratio (SNR) of this MR service falls due to the signal attenuation. A significant reduction in the SNR ratio causes the MC to search for a new mesh router have a good signal strength to continue their network services by activating the handover. Since, the nodes are dynamic, unstable and limited by security disputes with new Performance issues, a significant delay in handoff procedure may cause copious performance concerns such as network attacks and delay in the network. Therefore, during transmission it is a prerequisite that roaming customers have a comprehensive access authentication process in place that does not only with a short delay, but also with reinforcement for outpatient customers with handover networks. In addition, if a node is an inter-domain (communication between two domains), or Intra-domain (communication within a domain) wants to send some messages to its recipient the information is exchanged between several MRs. However, to prevent that Data exposure at each intermediate node, the messages should be encrypted by some security techniques or an ornate encryption technique that is required to ensure that even if the message is faked by an intruder, you may not be able to decrypt it anyway. Due to the dynamic character of the WMN, in which information about several hops or MR is transmitted, the time of data encryption is considered an important parameter. In addition, the most important factor that affects WMN performance is the type of basic routing protocols used to promote data packets. The presence of a malignant or misbehaving node within a routing path can interrupt network activity either by spoofing or by reducing data or by compromising the overall performance of the network.WMN is another developing field with its potential applications in to great degree erratic and dynamic situations. However, it is especially helpless because of its highlights of open medium, unique evolving topology, agreeable steering calculations. The article reviews the best in class in security for remote work systems. Right off the bat, we break down different conceivable dangers to security in x remote work systems. Secondly, we present some delegate arrangements to these dangers, including answers for the issues of key administration, secure system directing, and interruption location. We likewise give a correlation and talk of their individual benefits and disadvantages, and propose a few enhancements for these downsides. At long last, we additionally examine the remaining challenges in the zone. |
URI: | http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/7708 |
Appears in Collections: | B.Tech. Project Reports |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Secure Message Transmission during Handoff in Wireless Mesh Networks.pdf | 1.87 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.