Protection based on Neighborhood-Trust in Clustered Wireless Mesh Networks

被引:3
作者
Samad, Fahad [1 ]
Makram, Sadeq Ali [1 ]
机构
[1] Rhein Westfal TH Aachen, Dept Comp Sci, Chair Commun & Distributed Syst, Aachen, Germany
来源
THIRD INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES, AND TECHNOLOGIES, PROCEEDINGS | 2009年
关键词
wireless mesh networks; security and privacy; clustering; neighborhood trust; hash chains;
D O I
10.1109/NGMAST.2009.26
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Mesh Network (WMN) is unquestionably an interesting technology addition in wireless communication networks because of its self-organizing, self-healing and reliability dimensions. However, possible misuse or hijacking of these networks by adversaries make them highly vulnerable. In this paper, we provide a protection mechanism based on neighborhood trust to gain required security and identification privacy in a clustered WMN. Our approach renders a lightweight protection against security vulnerabilities using hash chains and does not require any trusted authority.
引用
收藏
页码:487 / 493
页数:7
相关论文
共 50 条
  • [21] Load Balancing in Wireless Mesh Networks Based on OpenFlow
    Kubota, Shota
    Sato, Fumiaki
    ADVANCES IN NETWORK-BASED INFORMATION SYSTEMS, NBIS-2017, 2018, 7 : 328 - 338
  • [22] QoS Based Mobility Management for Wireless Mesh Networks
    Rao, Y. M.
    Subramanyam, M. V.
    Prasad, K. S.
    JOURNAL OF SCIENTIFIC & INDUSTRIAL RESEARCH, 2018, 77 (04): : 203 - 207
  • [23] Automatic Android-based Wireless Mesh Networks
    Wong, Paul
    Varikota, Vijay
    Duong Nguyen
    Abukmail, Ahmed
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2014, 38 (04): : 313 - 320
  • [24] TOPOLOGICAL-BASED ARCHITECTURES FOR WIRELESS MESH NETWORKS
    Esmailpour, Amir
    Nasser, Nidal
    Taleb, Tarik
    IEEE WIRELESS COMMUNICATIONS, 2011, 18 (01) : 74 - 81
  • [25] A quality based routing protocol for wireless mesh networks
    Pal, Amitangshu
    Nasipuri, Asis
    PERVASIVE AND MOBILE COMPUTING, 2011, 7 (05) : 611 - 626
  • [26] Data ubiquity in autonomic wireless mesh networks
    Nkwe, Thabo K. R.
    Denko, Mieso K.
    Ernst, Jason
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2010, 1 (01) : 3 - 13
  • [27] Data ubiquity in autonomic wireless mesh networks
    Thabo K. R. Nkwe
    Mieso K. Denko
    Jason Ernst
    Journal of Ambient Intelligence and Humanized Computing, 2010, 1 : 3 - 13
  • [28] A trust infrastructure based authentication method for clustered vehicular ad hoc networks
    Fatemehsadat Mirsadeghi
    Marjan Kuchaki Rafsanjani
    Brij B. Gupta
    Peer-to-Peer Networking and Applications, 2021, 14 : 2537 - 2553
  • [29] A trust infrastructure based authentication method for clustered vehicular ad hoc networks
    Mirsadeghi, Fatemehsadat
    Rafsanjani, Marjan Kuchaki
    Gupta, Brij B.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (04) : 2537 - 2553
  • [30] Threat Model Based Security for Wireless Mesh Networks
    Popalyar, Freshta
    MOBILE COMPUTING, APPLICATIONS, AND SERVICES (MOBICASE 2015), 2015, 162 : 325 - 332