Abstract
Mesh technology presents a great deviation in the field of wireless networks thanks to its assets brought in the level of mobility, the quality of services and distribution of radios resources. Due to its importance, a working group was formed in IEEE organization in order to work out a standard for the Mesh networks under the reference IEEE 802.11s. Consequently, a whole of tasks remain in the course of research such as security. That allows the appearance of several solutions and protocols suggested by the researchers’ community in the literature. However, the existing simulators do not contain yet complete modules which allow studying this network. To remedy these problems, we thought of developing an environment of simulation for the evaluation of the authentication protocols for the IEEE 802.11s networks. This tool allows the easy development and the integration of new modules and thereafter its performances evaluation by providing appropriate measurements.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
NS-2, The Network Simulator, http://www.isi.edu/nsnam/ns
The ns-3 network simulator, http://www.nsnam.org/
Andreev, K., Boyko, P.: IEEE 802.11s Mesh Networking NS-3 Model
Catoio, G., Cibot, L., Laloux, M.: Etendre dynamiquement la couverture d’un réseau Mesh (2006/2007)
Faccin, S.M., Wijting, C., Kneckt, J., Damle, A.: Mesh wlan networks: concept and system design. IEEE Wireless Communications (April 2006)
Camp, J.D., Knightly, E.W.: The IEEE 802.11s Extended Service Set Mesh Networking Standard
IEEE P802.11s/D0.01 Draft Amendment to Standard for Information Technology-Telecommunications and Information Exchange Between Systems - LAN/MAN Specific Requirements-Part 11: Wireless Medium Access Control (MAC) and physical layer (PHY) specifications: Amendment: ESS Mesh Networking (March 2008)
Qiu, L., Bahl, P., Rao, A., Zhou, L.: Troubleshooting Wireless Mesh Networks
Holzner, S.: Total Java, Editions Eyrolles (2001)
Ajib, W.: Gestion de transmission d’un flux temporaire de donnés dans un réseau radio mobile d’accès TDMA. Thesis, ENST Paris (2000)
Wai, F.H., Ye, Y.N., James, N.H.: Intrusion Detection in wireless Ad Hoc networks. Introduction to wmobile Computing Technical Report CS4274
Daly, I., Zarai, F., Kamoun, L.: Secure Wireless Mobility Management. In: IEEE 17th International Conference on Telecommunications, ICT 2010 (2010)
Huang, D., Lin, P., Gan, C., Jeng, J.: A Mobility Management Mechanism using Location Cache for Wireless Mesh Network. In: QShine 2006, Waterloo, Ontario, Canada, August 1979. ACM (2006)
Khan, K., Akbar, M.: Authentication in Multi-Hop Wireless Mesh Networks. Proceedings of World Academy of Science, Engineering and Technology 16 (November 2006) ISSN 1307-6884
Izquierdo, A., Golmie, N., Hoeper, K., Chen, L.: Using the EAP Framework for Fast Media Independent Handover Authentication. National Institute of Standards and Technology, USA (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Daly, I., Zarai, F., Kamoun, L. (2012). Design and Implementation of a Simulation Environment for the Evaluation of Authentication Protocols in IEEE 802.11s Networks. In: Del Ser, J., et al. Mobile Lightweight Wireless Systems. Mobilight 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 81. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29479-2_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-29479-2_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29478-5
Online ISBN: 978-3-642-29479-2
eBook Packages: Computer ScienceComputer Science (R0)