3,151 research outputs found
Security and Privacy Issues in Wireless Mesh Networks: A Survey
This book chapter identifies various security threats in wireless mesh
network (WMN). Keeping in mind the critical requirement of security and user
privacy in WMNs, this chapter provides a comprehensive overview of various
possible attacks on different layers of the communication protocol stack for
WMNs and their corresponding defense mechanisms. First, it identifies the
security vulnerabilities in the physical, link, network, transport, application
layers. Furthermore, various possible attacks on the key management protocols,
user authentication and access control protocols, and user privacy preservation
protocols are presented. After enumerating various possible attacks, the
chapter provides a detailed discussion on various existing security mechanisms
and protocols to defend against and wherever possible prevent the possible
attacks. Comparative analyses are also presented on the security schemes with
regards to the cryptographic schemes used, key management strategies deployed,
use of any trusted third party, computation and communication overhead involved
etc. The chapter then presents a brief discussion on various trust management
approaches for WMNs since trust and reputation-based schemes are increasingly
becoming popular for enforcing security in wireless networks. A number of open
problems in security and privacy issues for WMNs are subsequently discussed
before the chapter is finally concluded.Comment: 62 pages, 12 figures, 6 tables. This chapter is an extension of the
author's previous submission in arXiv submission: arXiv:1102.1226. There are
some text overlaps with the previous submissio
A Multirate MAC Protocol for Reliable Multicast in Multihop Wireless Networks
Many multicast applications, such as audio/video streaming, file sharing or emergency reporting, are becoming quite common in wireless mobile environment, through the widespread deployment of 802.11-based wirelessnetworks. However, despite the growing interest in the above applications, the current IEEE 802.11 standard does not offer any medium access control (MAC) layer support to the efficient and reliable provision of multicast services. It does not provide any MAC-layer recovery mechanism for unsuccessful multicast transmissions. Consequently, lost frames cannot be detected, hence retransmitted, causing a significant quality of service degradation. In addition, 802.11 multicast traffic is sent at the basic data rate, often resulting in severe throughput reduction. In this work, we address these issues by presenting areliablemulticastMACprotocol for wirelessmultihopnetworks, which is coupled with a lightweight rate adaptation scheme. Simulation results show that our schemes provide high packet delivery ratio and when compared with other state-of-the-art solutions, they also provide reduced control overhead and data delivery dela
Recommended from our members
Dynamic wireless mobile framework for distributed collaborative real-time information generation and control systems
Intelligent Transportation Systems (ITS) have only recently discovered the exciting possibilities in the nomadic and ubiquitous computing space to build a new generation of information systems by allowing the vehicle to act both as a carrier and consumer of wireless (and thus omnipresent) information. Wide deployment of such ITS systems may eventually allow for more dynamic and efficient transportation systems, which can contribute in several ways towards greater economic growth whilst respecting environmental sustainability. A great number of researchers have dedicated considerable time and resources to tackling traffic related issues by utilising the new wireless capabilities enabled by ITS; such initiatives cover a wide range of applications such as safety, knowledge sharing and infotainment. Indicative of the extent of such efforts is the plethora of research projects initiated by many national and multi-national organisations such as the EU Framework Programme for Research and Technological Development. To achieve their goals, proposed solutions from such organisations depend on the development and deployment of intelligent wireless mobile communication systems, where data dissemination issues make the prospect of efficient and effective communication a challenging proposition. Presently, Car-to-Car and Car-to-Infrastructure communications are two distinct avenues that make possible efficient and reliable delivery of messages via direct radio links in traffic areas. In all cases, high quality of communication performance is desirable for a communication system composed mostly of roaming participants; such a system needs to be dynamic, flexible and infrastructure-less. Consequently, Mobile Ad hoc Network (MANET)-based networks are a natural fit to ITS
CMD: A Multi-Channel Coordination Scheme for Emergency Message Dissemination in IEEE 1609.4
In the IEEE 1609.4 legacy standard for multi-channel communications in
vehicular ad hoc networks(VANETs), the control channel (CCH) is dedicated to
broadcast safety messages while the service channels (SCH's) are dedicated to
transmit infotainment service content. However, the SCH can be used as an
alternative to transmit high priority safety messages in the event that they
are invoked during the service channel interval (SCHI). This implies that there
is a need to transmit safety messages across multiple available utilized
channels to ensure that all vehicles receive the safety message. Transmission
across multiple SCH's using the legacy IEEE 1609.4 requires multiple channel
switching and therefore introduces further end-to-end delays. Given that safety
messaging is a life critical application, it is important that optimal
end-to-end delay performance is derived in multi-channel VANET scenarios to
ensure reliable safety message dissemination. To tackle this challenge, three
primary contributions are in this article: first, a channel coordinator
selection approach based on the least average separation distance (LAD) to the
vehicles that expect to tune to other SCH's and operates during the control
channel interval (CCHI) is proposed. Second, a model to determine the optimal
time intervals in which CMD operates during the CCHI is proposed. Third, a
contention back-off mechanism for safety message transmission during the SCHI
is proposed. Computer simulations and mathematical analysis show that CMD
performs better than the legacy IEEE 1609.4 and a selected state-of-the-art
multi-channel message dissemination schemes in terms of end-to-end delay and
packet reception ratio.Comment: 15 pages, 10 figures, 7 table
- …