• P-ISSN 0974-6846 E-ISSN 0974-5645

Indian Journal of Science and Technology

Article

Indian Journal of Science and Technology

Year: 2018, Volume: 11, Issue: 46, Pages: 1-8

Original Article

A Systematic Review on Various Security Issues and its Mitigation Techniques in WMN

Abstract

Objectives: To delineate various security vulnerabilities and defence strategies involved in secure mobile communications. Methods/Statistical Analysis: Due to the enormous growth of mobile communication, there is also a fear on providing security and privacy preserving for users over the network. In this paper, the methodologies contributed for solving the security constraints of WMN have been discussed. Mainly, models based on Mutual Authentication, Authenticated Key Agreement (AKA), Elliptic Curve Cryptography based security employment and bilinear pairing techniques have been analyzed and described. Mention the methodology used; data base consulted, criteria for omission or inclusion; keywords used for data collection, period covered etc. Findings: The contribution involves in clear examination of methodologies satisfying major security requirements such as Authentication, Confidentiality, Availability and Integrity. Moreover, distinctive security constraints have been analyzed and mitigation techniques have been discussed for those security issues effectively. From the survey work, it is found that Mutual Authentication and Key agreement based Cryptographic conceits perform effectively in solving the security issues on WMN. Applications/Improvements: Further, this extensive analysis aims to elaborate the numerous unresolved issues and effective. 

Keywords: AKA, Bilinear Pairings, ECC, Mutual Authentication, WMN

DON'T MISS OUT!

Subscribe now for latest articles and news.