Protection based on Neighborhood-Trust in Clustered Wireless Mesh Networks

被引:3
作者
Samad, Fahad [1 ]
Makram, Sadeq Ali [1 ]
机构
[1] Rhein Westfal TH Aachen, Dept Comp Sci, Chair Commun & Distributed Syst, Aachen, Germany
来源
THIRD INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES, AND TECHNOLOGIES, PROCEEDINGS | 2009年
关键词
wireless mesh networks; security and privacy; clustering; neighborhood trust; hash chains;
D O I
10.1109/NGMAST.2009.26
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Mesh Network (WMN) is unquestionably an interesting technology addition in wireless communication networks because of its self-organizing, self-healing and reliability dimensions. However, possible misuse or hijacking of these networks by adversaries make them highly vulnerable. In this paper, we provide a protection mechanism based on neighborhood trust to gain required security and identification privacy in a clustered WMN. Our approach renders a lightweight protection against security vulnerabilities using hash chains and does not require any trusted authority.
引用
收藏
页码:487 / 493
页数:7
相关论文
共 50 条
[21]   Automatic Android-based Wireless Mesh Networks [J].
Wong, Paul ;
Varikota, Vijay ;
Duong Nguyen ;
Abukmail, Ahmed .
INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2014, 38 (04) :313-320
[22]   TOPOLOGICAL-BASED ARCHITECTURES FOR WIRELESS MESH NETWORKS [J].
Esmailpour, Amir ;
Nasser, Nidal ;
Taleb, Tarik .
IEEE WIRELESS COMMUNICATIONS, 2011, 18 (01) :74-81
[23]   Load Balancing in Wireless Mesh Networks Based on OpenFlow [J].
Kubota, Shota ;
Sato, Fumiaki .
ADVANCES IN NETWORK-BASED INFORMATION SYSTEMS, NBIS-2017, 2018, 7 :328-338
[24]   Routing Metric Based on Experience for Wireless Mesh Networks [J].
Ren, Zhi ;
Liu, Dongyuan ;
Zuo, Chengzhang ;
Yu, Jun .
PROCEEDINGS 2013 INTERNATIONAL CONFERENCE ON MECHATRONIC SCIENCES, ELECTRIC ENGINEERING AND COMPUTER (MEC), 2013, :519-522
[25]   A quality based routing protocol for wireless mesh networks [J].
Pal, Amitangshu ;
Nasipuri, Asis .
PERVASIVE AND MOBILE COMPUTING, 2011, 7 (05) :611-626
[26]   Threat Model Based Security for Wireless Mesh Networks [J].
Popalyar, Freshta .
MOBILE COMPUTING, APPLICATIONS, AND SERVICES (MOBICASE 2015), 2015, 162 :325-332
[27]   Data ubiquity in autonomic wireless mesh networks [J].
Nkwe, Thabo K. R. ;
Denko, Mieso K. ;
Ernst, Jason .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2010, 1 (01) :3-13
[28]   Data ubiquity in autonomic wireless mesh networks [J].
Thabo K. R. Nkwe ;
Mieso K. Denko ;
Jason Ernst .
Journal of Ambient Intelligence and Humanized Computing, 2010, 1 :3-13
[29]   QoS Mesh Routing Protocol for IEEE 802.16 based wireless mesh networks [J].
Kim, Min ;
Ra, Ilkyeun ;
Yoo, Jisang ;
Kim, Dongwook ;
Kim, Hwasung .
10TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III: INNOVATIONS TOWARD FUTURE NETWORKS AND SERVICES, 2008, :812-+
[30]   A trust infrastructure based authentication method for clustered vehicular ad hoc networks [J].
Fatemehsadat Mirsadeghi ;
Marjan Kuchaki Rafsanjani ;
Brij B. Gupta .
Peer-to-Peer Networking and Applications, 2021, 14 :2537-2553