MAC LAYER SECURITY ISSUES IN WIRELESS MESH NETWORKS

被引:2
|
作者
Reddy, K. Ganesh [1 ]
Thilagam, P. Santhi [2 ]
机构
[1] SVECM Bhimavaram, Dept Comp Sci & Engn, Bhimavaram, India
[2] NIT Surathkal, Dept Comp Sci & Engn, Mangaluru, Karnataka, India
来源
PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS (ICCS-2015) | 2016年 / 1715卷
关键词
heterogeneous; decentralized; security; MAC; ARCHITECTURE; ATTACK;
D O I
10.1063/1.4942710
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless Mesh Networks (WMNs) have emerged as a promising technology for a broad range of applications due to their self-organizing, self-configuring and self-healing capability, in addition to their low cost and easy maintenance. Securing WMNs is more challenging and complex issue due to their inherent characteristics such as shared wireless medium, multi-hop and inter-network communication, highly dynamic network topology and decentralized architecture. These vulnerable features expose the WMNs to several types of attacks in MAC layer. The existing MAC layer standards and implementations are inadequate to secure these features and fail to provide comprehensive security solutions to protect both backbone and client mesh. Hence, there is a need for developing efficient, scalable and integrated security solutions for WMNs. In this paper, we classify the MAC layer attacks and analyze the existing countermeasures. Based on attacks classification and countermeasures analysis, we derive the research directions to enhance the MAC layer security for WMNs.
引用
收藏
页数:9
相关论文
共 50 条
  • [31] Security issues in optical networks physical layer
    Teixeira, A.
    Vieira, A.
    Andrade, J.
    Quinta, A.
    Lima, M.
    Nogueira, R.
    Andre, P. S.
    Beleffi, G. Tosi
    ICTON 2008: PROCEEDINGS OF 2008 10TH ANNIVERSARY INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS, VOL 4, 2008, : 123 - +
  • [32] Securing wireless mesh networks in a unified security framework with corruption-resilience
    Wang, Ze
    Ma, Maode
    Wu, Jigang
    COMPUTER NETWORKS, 2012, 56 (12) : 2981 - 2993
  • [33] Adaptive Energy Efficient Cross-layer TDMA-based MAC Protocol in Wireless Mesh Sensor Networks
    Fan Jing
    Xie Jianbin
    Li Feng
    Li Geng
    PROGRESS IN MECHATRONICS AND INFORMATION TECHNOLOGY, PTS 1 AND 2, 2014, 462-463 : 98 - +
  • [34] Proportional fairness in MAC layer channel access of IEEE 802.11s EDCA based wireless mesh networks
    Chakraborty, Sandip
    Swain, Pravati
    Nandi, Sukumar
    AD HOC NETWORKS, 2013, 11 (01) : 570 - 584
  • [35] Review on Security Issues and Attacks in Wireless Sensor Networks
    Kaur, Lovepreet
    Malhotra, Jyoteesh
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2015, 8 (04): : 81 - 88
  • [36] Wireless Sensor Networks: Routing Protocols and Security Issues
    Anjali
    Shikha
    Sharma, Mohit
    2014 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT, 2014,
  • [37] Challenges and Security Issues in Underwater Wireless Sensor Networks
    Yang, Guang
    Dai, Lie
    Si, Guannan
    Wang, Shuxin
    Wang, Shouqiang
    2018 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS, 2019, 147 : 210 - 216
  • [38] WIRELESS BODY AREA NETWORKS: SECURITY AND PRIVACY ISSUES
    Muka, Romina
    Vukatana, Kreshnik
    Sevrani, Kozeta
    INTERNATIONAL JOURNAL OF ECOSYSTEMS AND ECOLOGY SCIENCE-IJEES, 2020, 10 (03): : 535 - 542
  • [39] Survey on Cybersecurity Issues in Wireless Mesh Networks based eHealthcare
    Salem, Kashif
    Zeb, Khan
    Derhab, Abdelouhid
    Abbas, Haider
    Al-Muhtadi, Jalal
    Organ, Mehmet A.
    Gawanmeh, Amjad
    2016 IEEE 18TH INTERNATIONAL CONFERENCE ON E-HEALTH NETWORKING, APPLICATIONS AND SERVICES (HEALTHCOM), 2016, : 24 - 30
  • [40] Routing management for performance and security tradeoff in wireless mesh networks
    Helber Silva
    Aldri Santos
    Michele Nogueira
    International Journal of Information Security, 2015, 14 : 35 - 46