MAC LAYER SECURITY ISSUES IN WIRELESS MESH NETWORKS

被引:2
|
作者
Reddy, K. Ganesh [1 ]
Thilagam, P. Santhi [2 ]
机构
[1] SVECM Bhimavaram, Dept Comp Sci & Engn, Bhimavaram, India
[2] NIT Surathkal, Dept Comp Sci & Engn, Mangaluru, Karnataka, India
来源
PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS (ICCS-2015) | 2016年 / 1715卷
关键词
heterogeneous; decentralized; security; MAC; ARCHITECTURE; ATTACK;
D O I
10.1063/1.4942710
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless Mesh Networks (WMNs) have emerged as a promising technology for a broad range of applications due to their self-organizing, self-configuring and self-healing capability, in addition to their low cost and easy maintenance. Securing WMNs is more challenging and complex issue due to their inherent characteristics such as shared wireless medium, multi-hop and inter-network communication, highly dynamic network topology and decentralized architecture. These vulnerable features expose the WMNs to several types of attacks in MAC layer. The existing MAC layer standards and implementations are inadequate to secure these features and fail to provide comprehensive security solutions to protect both backbone and client mesh. Hence, there is a need for developing efficient, scalable and integrated security solutions for WMNs. In this paper, we classify the MAC layer attacks and analyze the existing countermeasures. Based on attacks classification and countermeasures analysis, we derive the research directions to enhance the MAC layer security for WMNs.
引用
收藏
页数:9
相关论文
共 50 条
  • [21] A survey on mac layer in ad hoc wireless networks
    Liao Shengbin
    Zhu Xiaoliang
    2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL II, 2010, : 425 - 428
  • [22] A Security Protocol for MAC Layer in Cognitive Radio Networks
    Wu, Huayi
    Hui, Ning
    Bai, Baohua
    2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL IX, 2010, : 327 - 330
  • [23] A Security Protocol for MAC Layer in Cognitive Radio Networks
    Wu, Huayi
    Hui, Ning
    Bai, Baohua
    2011 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION AND INDUSTRIAL APPLICATION (ICIA2011), VOL IV, 2011, : 326 - 329
  • [24] Security in Wireless Sensor Networks: Issues and Challanges
    Salehi, Ahmad S.
    Razzaque, M. A.
    Naraei, Parisa
    Farrokhtala, Ali
    2013 IEEE INTERNATIONAL CONFERENCE ON SPACE SCIENCE AND COMMUNICATION (ICONSPACE), 2013, : 356 - 360
  • [25] Security Issues in Wireless Sensor Networks: A Survey
    Chowdhury, Mahfuzulhoq
    Kader, Md Fazlul
    Asaduzzaman
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2013, 6 (05): : 97 - 115
  • [26] Issues in Wireless Sensor Networks with an Emphasis on Security
    Sharma, Kartik
    Sharma, Sheeba
    ICCCE 2018, 2019, 500 : 419 - 425
  • [27] A Survey on Mac Layer in Ad Hoc Wireless Networks
    Liao Shengbin
    Zhu Xiaoliang
    APPLIED INFORMATICS AND COMMUNICATION, PT 2, 2011, 225 : 691 - 699
  • [28] Experimental Study of Security Architectures for Wireless Mesh Networks
    Martignon, Fabio
    Paris, Stefano
    2009 6TH ANNUAL IEEE COMMUNICATION SOCIETY CONFERENCE ON SENSOR, MESH AND AD HOC COMMUNICATIONS AND NETWORKS WORKSHOPS, 2009, : 176 - +
  • [29] MobiSEC: A Novel Security Architecture for Wireless Mesh Networks
    Martignon, Fabio
    Paris, Stefano
    Capone, Antonio
    Q2SWINET'08: PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, 2008, : 35 - 42
  • [30] CAPOT: A Cross-Layer MAC Protocol for One-Way TCP Flow in Wireless Mesh Networks
    Xue, Xiuhui
    Lv, Pin
    Chen, Yingwen
    Xu, Ming
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,