Protection based on Neighborhood-Trust in Clustered Wireless Mesh Networks

被引:3
作者
Samad, Fahad [1 ]
Makram, Sadeq Ali [1 ]
机构
[1] Rhein Westfal TH Aachen, Dept Comp Sci, Chair Commun & Distributed Syst, Aachen, Germany
来源
THIRD INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES, AND TECHNOLOGIES, PROCEEDINGS | 2009年
关键词
wireless mesh networks; security and privacy; clustering; neighborhood trust; hash chains;
D O I
10.1109/NGMAST.2009.26
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Mesh Network (WMN) is unquestionably an interesting technology addition in wireless communication networks because of its self-organizing, self-healing and reliability dimensions. However, possible misuse or hijacking of these networks by adversaries make them highly vulnerable. In this paper, we provide a protection mechanism based on neighborhood trust to gain required security and identification privacy in a clustered WMN. Our approach renders a lightweight protection against security vulnerabilities using hash chains and does not require any trusted authority.
引用
收藏
页码:487 / 493
页数:7
相关论文
共 50 条
[41]   A Cloud Computing based Management System for Wireless Mesh Networks [J].
Hu, Huichun ;
Jiang, Xinhua ;
Zhu, Quan ;
Zou, Fumin .
2013 IEEE 15TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2013 IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (HPCC_EUC), 2013, :1209-1212
[42]   Spatial reuse in IEEE 802.16 based wireless mesh networks [J].
Fu, LQ ;
Cao, ZG ;
Fan, PY .
International Symposium on Communications and Information Technologies 2005, Vols 1 and 2, Proceedings, 2005, :1311-1314
[43]   Opportunistic Routing in LoRa-based Wireless Mesh Networks [J].
Rosier, Sascha ;
Zubow, Anatolij ;
Dressler, Falko .
2023 IEEE 24TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS, WOWMOM, 2023, :364-369
[44]   Securing Wireless Mesh Networks with Ticket-Based Authentication [J].
Qazi, Shams ;
Mu, Yi ;
Susilo, Willy .
ICSPCS: 2ND INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS, PROCEEDINGS, 2008, :746-755
[45]   Gateway deployment of wireless mesh networks based on substitution principle [J].
Huang S.-Q. ;
Wang G.-C. ;
Zhang Z. ;
Xu Y.-J. ;
An Z.-L. ;
Deng Y.-H. ;
Li Y. .
Jisuanji Xuebao/Chinese Journal of Computers, 2016, 39 (06) :1120-1134
[46]   Distance Progress Based Opportunistic Routing for Wireless Mesh Networks [J].
Darehshoorzadeh, Amir ;
Cerda-Alabern, Llorenc .
2012 8TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2012, :179-184
[47]   Node stability-based routing in Wireless Mesh Networks [J].
Boushaba, Mustapha ;
Hafid, Abdelhakim ;
Gendreau, Michel .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 93 :1-12
[48]   Huddle Based Tenable Data Communication in Wireless Mesh Networks [J].
Regan, R. ;
Manickam, J. Martin Leo ;
Anand, R. .
2012 INTERNATIONAL CONFERENCE ON RADAR, COMMUNICATION AND COMPUTING (ICRCC), 2012, :11-13
[49]   QoSBR: A Quality Based Routing Protocol for Wireless Mesh Networks [J].
Pal, Amitangshu ;
Adimadhyam, Sandeep ;
Nasipuri, Asis .
DISTRIBUTED COMPUTING AND NETWORKING, PROCEEDINGS, 2010, 5935 :497-508
[50]   Structural unfairness in 802.11-based wireless mesh networks [J].
Li, Lily ;
Ward, Paul A. S. .
CNSR 2007: PROCEEDINGS OF THE FIFTH ANNUAL CONFERENCE ON COMMUNICATION NETWORKS AND SERVICES RESEARCH, 2007, :213-+