2,145 research outputs found
Security and Privacy Issues in Wireless Mesh Networks: A Survey
This book chapter identifies various security threats in wireless mesh
network (WMN). Keeping in mind the critical requirement of security and user
privacy in WMNs, this chapter provides a comprehensive overview of various
possible attacks on different layers of the communication protocol stack for
WMNs and their corresponding defense mechanisms. First, it identifies the
security vulnerabilities in the physical, link, network, transport, application
layers. Furthermore, various possible attacks on the key management protocols,
user authentication and access control protocols, and user privacy preservation
protocols are presented. After enumerating various possible attacks, the
chapter provides a detailed discussion on various existing security mechanisms
and protocols to defend against and wherever possible prevent the possible
attacks. Comparative analyses are also presented on the security schemes with
regards to the cryptographic schemes used, key management strategies deployed,
use of any trusted third party, computation and communication overhead involved
etc. The chapter then presents a brief discussion on various trust management
approaches for WMNs since trust and reputation-based schemes are increasingly
becoming popular for enforcing security in wireless networks. A number of open
problems in security and privacy issues for WMNs are subsequently discussed
before the chapter is finally concluded.Comment: 62 pages, 12 figures, 6 tables. This chapter is an extension of the
author's previous submission in arXiv submission: arXiv:1102.1226. There are
some text overlaps with the previous submissio
Mobility and Handoff Management in Wireless Networks
With the increasing demands for new data and real-time services, wireless
networks should support calls with different traffic characteristics and
different Quality of Service (QoS)guarantees. In addition, various wireless
technologies and networks exist currently that can satisfy different needs and
requirements of mobile users. Since these different wireless networks act as
complementary to each other in terms of their capabilities and suitability for
different applications, integration of these networks will enable the mobile
users to be always connected to the best available access network depending on
their requirements. This integration of heterogeneous networks will, however,
lead to heterogeneities in access technologies and network protocols. To meet
the requirements of mobile users under this heterogeneous environment, a common
infrastructure to interconnect multiple access networks will be needed. In this
chapter, the design issues of a number of mobility management schemes have been
presented. Each of these schemes utilizes IP-based technologies to enable
efficient roaming in heterogeneous network. Efficient handoff mechanisms are
essential for ensuring seamless connectivity and uninterrupted service
delivery. A number of handoff schemes in a heterogeneous networking environment
are also presented in this chapter.Comment: 28 pages, 11 figure
A Multi-layer Routing Protocol for Mobility Management in Wireless Mesh Networks
AbstractIn the recent trends, Wireless Mesh networks are proven to be one of the emerging fields in the wireless networks. WMNs comprises of Gateways (GWs), Mesh Clients (MCs) and Mesh Routers (MRs). However, it is challenging job to provide seamless connectivity when MC moves around the network. The recent advances in the field of wireless technology created a chance to overwhelmed the disadvantages of wired and wireless networks. The mobility management in the WMNs motivated the researchers to concentrate. In this paper, we are proposing a model called as multi-layer routing protocol for WMNs. This protocol works with the data link layer and network layer for data frame transmission. The proposed algorithm is implemented with intra domain for experimental evaluation. The experimental results show the effectiveness of the routing protocol
Flow Allocation for Maximum Throughput and Bounded Delay on Multiple Disjoint Paths for Random Access Wireless Multihop Networks
In this paper, we consider random access, wireless, multi-hop networks, with
multi-packet reception capabilities, where multiple flows are forwarded to the
gateways through node disjoint paths. We explore the issue of allocating flow
on multiple paths, exhibiting both intra- and inter-path interference, in order
to maximize average aggregate flow throughput (AAT) and also provide bounded
packet delay. A distributed flow allocation scheme is proposed where allocation
of flow on paths is formulated as an optimization problem. Through an
illustrative topology it is shown that the corresponding problem is non-convex.
Furthermore, a simple, but accurate model is employed for the average aggregate
throughput achieved by all flows, that captures both intra- and inter-path
interference through the SINR model. The proposed scheme is evaluated through
Ns2 simulations of several random wireless scenarios. Simulation results reveal
that, the model employed, accurately captures the AAT observed in the simulated
scenarios, even when the assumption of saturated queues is removed. Simulation
results also show that the proposed scheme achieves significantly higher AAT,
for the vast majority of the wireless scenarios explored, than the following
flow allocation schemes: one that assigns flows on paths on a round-robin
fashion, one that optimally utilizes the best path only, and another one that
assigns the maximum possible flow on each path. Finally, a variant of the
proposed scheme is explored, where interference for each link is approximated
by considering its dominant interfering nodes only.Comment: IEEE Transactions on Vehicular Technolog
Secure Routing Protocol for Integrated UMTS and WLAN Ad Hoc Networks
The integrated UMTS and WLAN ad hoc networks are getting more and more popular as they hold substantial advantages by next generation networks. We introduce a new secure, robust routing protocol specifically designed for next generation technologies and evaluated its performance. The design of the SNAuth_SPERIPv2 secure routing protocol takes advantage to the integrated network, maintaining Quality of Service (QoS) under Wormhole Attack (WHA). This paper compares performance of newly developed secure routing protocol with other security schemes for CBR video streaming service under WHA
Efficient Security Protocols for Fast Handovers in Wireless Mesh Networks
Wireless mesh networks (WMNs) are gaining popularity as a flexible and inexpensive replacement for Ethernet-based infrastructures. As the use of mobile devices such as smart phones and tablets is becoming ubiquitous, mobile clients should be guaranteed uninterrupted connectivity and services as they move from one access point to another within a WMN or between networks. To that end, we propose a novel security framework that consists of a new architecture, trust models, and protocols to offer mobile clients seamless and fast handovers in WMNs. The framework provides a dynamic, flexible, resource-efficient, and secure platform for intra-network and inter-network handovers in order to support real-time mobile applications in WMNs. In particular, we propose solutions to the following problems: authentication, key management, and group key management. We propose
(1) a suite of certificate-based authentication protocols that minimize the authentication delay during handovers from one access point to another within a network (intra-network authentication).
(2) a suite of key distribution and authentication protocols that minimize the authentication delay during handovers from one network to another (inter-network authentication).
(3) a new implementation of group key management at the data link layer in order to
reduce the group key update latency from linear time (as currently done in IEEE 802.11 standards) to logarithmic time. This contributes towards minimizing the latency of the handover process for mobile members in a multicast or broadcast group
- …