Security in Wireless Mesh Networks
نویسندگان
چکیده
Wireless mesh networks (WMN) have recently captured the interest of academic and industrial researcher communities; because they represent a good solution to providing wireless Internet connectivity in a sizable geographic area. However, the architecture and configuration of this type of network do not ensure protection against unauthorized use of the network. This is because the basic used security measures do not include the notion of mobility, which characterizes these networks. In this article, we first propose a secure re-authentication mechanism named Secure Wireless Mobility Management (SWMM). This mechanism is carried out while the mobile station (MS) crosses different nodes, to allow users fulfilling an effective and reliable handoff as well as a secure access to services offered by the WMN. Second, we propose a new scheme, called Selective and Deterministic Pipelined packet Marking for Mesh Networks (SDPMM). This scheme is used for IP traffic source identification for tracing denial of service (DoS) attacks. The approach follows the IP traceback approach proposed in wired networks. Our study shows that SWMM outperforms other existing methods in terms of handoff latency, loss and blocking rate. It also shows that the traffic overhead introduced by the traceback scheme does not affect the network performance.
منابع مشابه
A New Method based on Intelligent Water Drops for Multicast Routing in Wireless Mesh Networks
In recent years a new type of wireless networks named wireless mesh networks has drawn the attention of researchers. In order to increase the capacity of mesh network, nodes are equipped with multiple radios tuned on multiple channels emerging multi radio multi channel wireless mesh networks. Therefore, the main challenge of these networks is how to properly assign the channels to the radios. O...
متن کاملA Survey on Multicast Routing Approaches in Wireless Mesh Networks
Wireless mesh networks (WMNs) which mediates the broadband Internet access, have been recently received many attentions by the researchers. In order to increase capacity in these networks, nodes are equipped with multiple radios tuned on multiple channels emerging multi radio multi-channel WMNs (MRMC WMNs). Therefore, a vital challenge that poses in MRMC WMNs is how to properly assign channels ...
متن کاملA Novel Multicast Tree Construction Algorithm for Multi-Radio Multi-Channel Wireless Mesh Networks
Many appealing multicast services such as on-demand TV, teleconference, online games and etc. can benefit from high available bandwidth in multi-radio multi-channel wireless mesh networks. When multiple simultaneous transmissions use a similar channel to transmit data packets, network performance degrades to a large extant. Designing a good multicast tree to route data packets could enhance the...
متن کاملInterference-Aware and Cluster Based Multicast Routing in Multi-Radio Multi-Channel Wireless Mesh Networks
Multicast routing is one of the most important services in Multi Radio Multi Channel (MRMC) Wireless Mesh Networks (WMN). Multicast routing performance in WMNs could be improved by choosing the best routes and the routes that have minimum interference to reach multicast receivers. In this paper we want to address the multicast routing problem for a given channel assignment in WMNs. The channels...
متن کاملToward an energy efficient PKC-based key management system for wireless sensor networks
Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...
متن کاملSecurity Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کامل