19 research outputs found
Study of Performance of Security Protocols in Wireless Mesh Network
Wireless Mesh Networks (WMNs) represent a good solution to providing wireless Internet connectivity in a sizable geographic area; this new and promising paradigm allows for network deployment at a much lower cost than with classic WiFi networks. Standards-based wireless access takes
advantage of the growing popularity of inexpensive Wi-Fi clients,enabling new service opportunities and applications that improve user productivity and responsiveness. The deployment of WMNs, are suffered by : (i) All, the communications being wireless and therefore prone to
interference, present severe capacity and delay constraints, (ii) The second reason that slows down the deployment of WMNs is the lack of security guarantees. Wireless mesh networks mostly susceptible to routing protocol threats and route disruption attacks. Most of these
threats require packet injection with a specialized knowledge of the routing protocol; the threats to wireless mesh networks and are summarized as (i) External attacks: in which attackers not belonging to the network jam the communication or inject erroneous information, and
(ii) Internal attacks: in which attackers are internal, compromised nodes that are difficult to be detected. The MAC layers of WMN are subjected to the attacks like Eavesdropping, Link Layer Jamming Attack, MAC Spoofing Attack, and Replay Attack. The attacks in Network Layer are:
Control Plane Attacks, Data Plane Attacks, Rushing attack, Wormhole attack, and Black Hole Attack. In this project work we are concern with the threats related to Network layer of WMN based upon 802.11i and analysis the performance of secure routing protocols and their
performance against the intrusion detection
Recommended from our members
Intra- and Inter-Session Network Coding in Wireless Networks
In this paper, we are interested in improving the performance of constructive
network coding schemes in lossy wireless environments.We propose I2NC - a
cross-layer approach that combines inter-session and intra-session network
coding and has two strengths. First, the error-correcting capabilities of
intra-session network coding make our scheme resilient to loss. Second,
redundancy allows intermediate nodes to operate without knowledge of the
decoding buffers of their neighbors. Based only on the knowledge of the loss
rates on the direct and overhearing links, intermediate nodes can make
decisions for both intra-session (i.e., how much redundancy to add in each
flow) and inter-session (i.e., what percentage of flows to code together)
coding. Our approach is grounded on a network utility maximization (NUM)
formulation of the problem. We propose two practical schemes, I2NC-state and
I2NC-stateless, which mimic the structure of the NUM optimal solution. We also
address the interaction of our approach with the transport layer. We
demonstrate the benefits of our schemes through simulations
TCP VON: Joint Congestion Control and Online Network Coding for Wireless Networks
Abstract-In this paper, we propose TCP Vegas with online network coding (TCP VON), which incorporates online network coding into TCP. It is shown that the use of online network coding in transport layer can improve the throughput and reliability of the end-to-end communication. Compared to generation based network coding, in online network coding, packets can be decoded consecutively instead of generation by generation. Thus, online network coding incurs a low decoding delay. In TCP VON, the sender transmits redundant coded packets when it detects packet losses from acknowledgement. Otherwise, it transmits innovative coded packets. We establish a Markov chain to analytically model the average decoding delay of TCP VON. We also conduct ns-2 simulations to validate the proposed analytical model. Finally, we compare the delay and throughput performance of TCP VON and automatic repeat request (ARQ) network coding based TCP (TCP ARQNC). Simulation results show that TCP VON outperforms TCP ARQNC in terms of the average decoding delay and network throughput