版权所有:内蒙古大学图书馆 技术提供:维普资讯• 智图
内蒙古自治区呼和浩特市赛罕区大学西街235号 邮编: 010021
作者机构:Department of Computer Science and Engineering University College of Engineering Villupuram Villupuram India Department of Electronics and Communication Engineering St. Joseph’s College of Engineering Chennai India
出 版 物:《International Journal of Information Technology (Singapore)》 (Int. J. Inf. Technol.)
年 卷 期:2021年第13卷第3期
页 面:1033-1038页
主 题:Malicious node Public key authentication Security Unique Secret Code Wireless mesh network
摘 要:A group of mobile nodes that dynamically create a short-term network called an wireless mesh network. In which the nodes are proficient in communicating with other node without the help of any central administrator or a network infrastructure. Since the wireless mesh network shows the characteristics like open medium, dynamic topology and distributed cooperation, the network is so weak against security attacks. The security attacks in routing may upset the successful communication and cause partly or wholly blocked network. Thus, the security has become a vital apprehension to achieve a successful and proper communication between mobile nodes in wireless mesh network. Impersonation is a security attack in which the attacker tries to modify the topology of the network or separate any certified node from the network by using the identity of a certified node in the network. In the proposed system, the Unique Secret Code (USC) is used to avoid impersonation and the corresponding node is kept separated from the network. © 2021, Bharati Vidyapeeth s Institute of Computer Applications and Management.