Filters








7,135 Hits in 5.2 sec

Securing Layer-2 Path Selection in Wireless Mesh Networks [chapter]

Md. Shariful Islam, Md. Abdul Hamid, Byung Goo Choi, Choong Seon Hong
2009 Lecture Notes in Computer Science  
The current draft standard of 802.11s has defined routing for Wireless Mesh Networks (WMNs) in layer-2 and to differentiate from layer-3 routing, it termed layer-2 routing as path selection.  ...  The layer-2 path selection (LPS) mechanism is fully specified in the draft of IEEE 802.11s for WMNs. However, routing with security provision is not specified in the standard.  ...  We develop a Secure Layer-2 Path Selection (SLPS) protocol for wireless mesh networks.  ... 
doi:10.1007/978-3-642-00306-6_6 fatcat:36abkqvkwfenhlki7ekdmwdktu

Differentiated security in wireless mesh networks

Thomas Gamer, Lars Völker, Martina Zitterbart
2008 Proceedings of the 4th ACM symposium on QoS and security for wireless and mobile networks - Q2SWinet '08  
Due to multihop communication and routing on layer 2 in mesh networks, attacks on the routing, selective forwarding, and eavesdropping on confidential data become relatively easy.  ...  The upcoming IEEE 802.11s standard enables easy establishment and maintenance of wireless mesh networks in residential and enterprise scenarios.  ...  All mesh nodes participate in the path selection protocol used in this particular Wireless LAN (WLAN) mesh.  ... 
doi:10.1145/1454586.1454607 dblp:conf/mswim/GamerVZ08 fatcat:hl6mza5tavfqtfp764ijrdpiku

Privacy Preserved and Secured Reliable Routing Protocol for Wireless Mesh Networks

Navamani Thandava Meganathan, Yogesh Palanichamy
2015 The Scientific World Journal  
Privacy preservation and security provision against internal attacks in wireless mesh networks (WMNs) are more demanding than in wired networks due to the open nature and mobility of certain nodes in the  ...  Due to the characteristics of WMNs, it is more vulnerable to many network layer attacks.  ...  [13] introduced a secure route selection scheme in wireless mesh networks.  ... 
doi:10.1155/2015/636590 pmid:26484361 pmcid:PMC4592909 fatcat:t4z4wlshlfgjfdalmzjqa4amse

Trust Centric Stable Routing For Wireless Mesh Networks

Navamani Meganathan
2017 International Journal of Intelligent Engineering and Systems  
Wireless Mesh Network (WMN) is an emerging next generation wireless technology with several applications in wireless environment.  ...  The simulation results prove that TCSR provides optimal network performance in terms of throughput and delay and also provides better security against packet dropping attacks.  ...  [9] introduced a secure route selection scheme in wireless mesh networks.  ... 
doi:10.22266/ijies2017.1231.16 fatcat:cvlljmnopzej7azl3vrwjtoz6a

Securing Wireless Mesh Networks

Steve Glass, Marius Portmann, Vallipuram Muthukkumarasamy
2008 IEEE Internet Computing  
In this article, the authors consider the problem of ensuring security in WMNs, introduce the IEEE 802.11s draft standard, and discuss the open security threats faced at the network and data-link layers  ...  Wireless mesh networks (WMNs) combine the robustness and performance of conventional infrastructure networks with the large service area and self-organizing and self-healing properties of mobile ad hoc  ...  In 802.11s, Hybrid Wireless Mesh Protocol (HWMP) performs path selection at the MAC layer, and the protocol forwards frames at this layer.  ... 
doi:10.1109/mic.2008.85 fatcat:ancmy2e7wnbmbn2xpb7oon3fia

A Survey on Grey Hole Attack in Wireless mesh Networks

Kanu Geete, Piyush Kumar Shukla, Anjana Jayant Deen
2014 International Journal of Computer Applications  
It is a network having many to many connections with the capability of dynamically healing the network topology. Security is a challenging application of a wireless mesh network.  ...  A wireless mesh network is a kind of multi-hop network and can be used as synonym for an ad-hoc network.  ...  Thus security becomes a critical parameter for wireless mesh network. We have discussed attacks and their types in this paper on a wireless mesh network.  ... 
doi:10.5120/16736-7019 fatcat:cfgerq4df5cuvkj7yamxc25a4i

Trust based Secure Reliable Route Discovery in Wireless Mesh Networks

2019 KSII Transactions on Internet and Information Systems  
Secured and reliable routing is a crucial factor for improving the performance of Wireless Mesh Networks (WMN) since these networks are susceptible to many types of attacks.  ...  The existing assumption about the internal nodes in wireless mesh networks is that they cooperate well during the forwarding of packets all the time.  ...  The metric considers network layer observations of forwarding behavior, in combination with MAC layer measurements of wireless link quality to select more reliable and higher performance path.  ... 
doi:10.3837/tiis.2019.07.004 fatcat:ax4uucipxbdg3gn4h6x4g7c6ta

A QoS-Aware Mesh Protocol for Future Home Networks Using Autonomic Architecture

Kaouthar Sethom, Tara Ali-Yahiya, Nassim Laga, Guy Pujolle
2008 EURASIP Journal on Wireless Communications and Networking  
In this article, we investigate the key concept of adding a knowledge plane to enable the automated control and management of home resources taking into account wireless mesh topology basis.  ...  This new supplementary plane helps to make an intelligent decision to select network paths that have sufficient resources to satisfy the QoS requirements of the admitted connections.  ...  ROUTING METRICS IN WIRELESS MESH NETWORKS Selecting a good path is considerably harder in wireless networks than in traditional wired networks (where the routing problem is usually solved by running a  ... 
doi:10.1155/2008/386898 fatcat:sqn6simwx5hxdeqtlbai5lu54m

Analysis of Routing and Secure Routing in Hybrid Wireless Mesh Networks

Ganesh Reddy Karri
2020 International Journal for Research in Applied Science and Engineering Technology  
Interoperability is one of the main characteristics of Hybrid Wireless Mesh Networks (HWMNs).  ...  In this paper, we analyze the issues in HWMNs routing protocols, and the security issues in proactive, reactive and hybrid protocols with respect to various network layer attacks.  ...  However, none of these routing protocols address the security issues in hybrid wireless mesh networks.  ... 
doi:10.22214/ijraset.2020.4149 fatcat:oefdk43xtrhcthm5yl32ie4okq

Channel Re-assignment in Wireless Mesh Networks based on Link Load Estimation

Krishna KumarJha, Jitendra Nath Shaw
2012 International Journal of Computer Applications  
A channel assignment scheme for multi-radio WMNs (Wireless Mesh Networks) to provide high-throughput paths especially for the highly loaded node with the best connectivity to the gateway(e.g. in terms  ...  We observed the flows on the links and data packets at each wireless access point in an existing wireless mesh backbone from logs files of traffic flows generated at gateway level.  ...  Second, cross-layer and common-layer design become a necessity because changes in routing paths involve channel switching in a mesh node.  ... 
doi:10.5120/8573-2309 fatcat:letx6y5shndyjcfklynqsoz7s4

Wireless mesh networks: a survey

Ian F. Akyildiz, Xudong Wang, Weilin Wang
2005 Computer Networks  
Despite recent advances in wireless mesh networking, many research challenges remain in all protocol layers. This paper presents a detailed study on recent advances and open research issues in WMNs.  ...  in the mesh routers.  ...  Vuran, all with Broadband and Wireless Networking Lab at Georgia Institute of Technology, for their constructive comments.  ... 
doi:10.1016/j.comnet.2004.12.001 fatcat:xsmbqrazefhonedmzn5rydw47a

Survey on Attacks Pertaining to Wireless Mesh Networks and Approach towards Counter Measures

Seema Devi, Sandeep Dalal
2016 International Journal of Computer Applications  
Wireless Mesh Networks (WMN) is an integralbroadband wireless network who provides high bandwidth internet service to users.  ...  different layers of security challenges, analyzing the counter remedies and protection mechanisms in place various attacks listed.  ...  Wireless Mesh networks consist of: SECURITY CHALLENGES IN WMNS WMNs completely for some reasons it is difficult to be protected.  ... 
doi:10.5120/ijca2016911662 fatcat:5bafhogvoraw5mg3o33iw3oeme

Secure Path Selection Using SAODV in Wireless Ad Hoc Network
IJARCCE - Computer and Communication Engineering

ARYA. S.P
2014 IJARCCE  
In order to support both network operations and security requirements of critical applications, we present SAMNAR, a Survivable Ad hoc and Mesh Network ARchitecture.  ...  The evaluation of this path selection scheme considers scenarios using urban mesh network mobility with urban propagation models, and also random way point mobility with two-ray ground propagation models  ...  VI.EVALUATIONS OF THE PATH SELECTION SCHEME It analyze the protocol-independent path selection scheme using Network Simulator (NS-2) version 2.30.  ... 
doi:10.17148/ijarcce.2014.31136 fatcat:3wizjawqcbdu3gtf6jss2ipgmy

Mesh technology enabling ubiquitous wireless networks

Guido R. Hiertz, Sebastian Max, Erik Weiß, Lars Berlemann, Dee Denteneer, Stefan Mangold
2006 Proceedings of the 2nd annual international workshop on Wireless internet - WICON '06  
Furthermore we show possibilities and limitations of Wireless Mesh Networks (WMNs). Index Terms-Wireless Mesh Networks, IEEE 802.11s, IEEE 802.15.5, IEEE 802.16j, WLAN, WPAN, WMAN  ...  With this meshing functionality, wireless networks of the IEEE 802 standard family are a promising low-cost alternative to cellular Third-Generation (3G) networks In this paper we provide insight to current  ...  Thus, other radio communication in its neighborhood may be affected too. 2) Path selection at MAC layer due to Cross-layer impacts: Wireless Mesh Networks (WMNs) based on multi-hop connections use routing  ... 
doi:10.1145/1234161.1234168 dblp:conf/wicon/HiertzMWBDM06 fatcat:sqb5oyassjh6xodowya7vzo6pq

Emerging standards for wireless mesh technology

M.J. Lee, Jianliang Zheng, Young-Bae Ko, Deepesh Man Shrestha
2006 IEEE wireless communications  
(IITA), the Ministry of Information and Communication (MIC) in Korea, and the Samsung Advanced Institute of Technology.  ...  This work is supported by the Ubiquitous Autonomic Computing and Network project (The 21st Century Frontier R&D Program), the ITRC pro-gram supervised by the Institute of Information Technology Assessment  ...  A layer-2 path selection protocol is supposed to handle unicast and broadcast/multicast data delivery in the WLAN mesh.  ... 
doi:10.1109/mwc.2006.1632481 fatcat:2zdncpvfcfazrgzzbz4kkipkh4
« Previous Showing results 1 — 15 out of 7,135 results