Abstract
The rapid emergence of wireless electronics such as iPhone and iPad has changed the way people communicate with each other. While wireless service providers continue to expand the capacity of their network infrastructures, one of the key components—wireless mesh network (WMN)—is expected to dominate the wireless interconnection and access networks. With wireless services integrated into our work and home activities, WMN security issues become evident. This chapter provides an extensive coverage on the security challenges, requirements, attacks, and countermeasure mechanisms that are related to wireless mesh networks. The treatment of these subjects is based on both theoretical analysis and practical application. In addition, cuttingedge wireless mesh network research projects and commercial products are discussed to provide technical insights for researchers and practitioners.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Faccin SM, Wijting C, Kenckt J, Damle A (2006) Mesh WLAN networks: concept and system design. IEEE Wireless Communications, 13(2): 10–17.
Hiertz G R, Denteneer D, Max S, Taori R, Cardona J, Berlemann L, Walke B (2010) IEEE 802.11s: The WLAN Mesh Standard. IEEE Wireless Communications, 17(1): 104–111.
Kraemer K L, Dedrick J, Sharma P (2011) One Laptop Per Child (OLPC): A Novel Computerization Movement. Proceedings of the 44th Hawaii International Conference on System Sciences, pp. 1–10.
Yarali A, Ahsant B, Rahman S (2009) Wireless Mesh Networking: A Key Solution for Emergency & Rural Applications. The Second International Conference on Advances in Mesh Networks (MESH 2009), pp. 143–149.
IEEE P802.11—Task Group S (2011) Status of Project IEEE 802.11s Mesh Networking. http://www.ieee802.org/11/Reports/tgs update.htm. Accessed 30 June, 2011.
Carrano R C, MagalhĂŁes LCS, Saade DCM, Albuquerque CVN (2011) IEEE 802.11s Multihop MAC: A Tutorial. IEEE Communications Surveys & Tutorials, 13(1).
Salem N B, Hubaux J P (2006) Securing wireless mesh networks. IEEE Wireless Communications, 13(2): 50–55.
Glass S, Portmann M, Muthukkumarasamy V (2008) SecuringWireless Mesh Networks. IEEE Internet Computing, 12(4): 30–36.
Zhang W, Wang Z, Das S K, Hassan M (2007) Security Issues in Wireless Mesh Networks. Wireless Mesh Networks, pp. 309–330.
IEEE 802.11 Working Group (2007) IEEE Standard for Information Technology— Telecommunications and Information Exchange between Systems— Local and Metropolitan Area Networks—Specific Requirements—Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications.
Edney J, Arbaugh W A (2004) Real 802.11 Security: Wi-Fi Protected Access and 802.11i. Addison-Wesley Professional, Boston.
Frankel S, Eydt B, Owens L, Scarfone K (2007) Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i. Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-97.
Kurose J F, Ross KW(2010) Computer Networking: A Top-Down Approach (5th edition). Wesley, New York.
IEEE Standard for Local and metropolitan area networks (2004) 802.1X: Port — Based Network Access Control.
Aboba B, Blunk L, Vollbrecht J, Carlson J, Levkowetz H (2004) IETF RFC 3748: Extensible Authentication Protocol (EAP).
Simon D, Aboba B, Hurst R (2008) IETF RFC 5216: The EAP-TLS Authentication Protocol.
Haverinen H, Salowey J (2006) IETF RFC 4186: Extensible Authentication Protocol Method for Global System for Mobile Communications (GSM) Subscriber Identity Modules (EAP-SIM).
Rigney C, Willens S, Rubens A, Simpson W (2000) IETF RFC2865: Remote Authentication Dial-In User Service (RADIUS).
Harkins D (2008) Simultaneous Authentication of Equals: A Secure, Password-Based Key Exchange for Mesh Networks. In Proceedings of the Second International Conference on Sensor Technologies and Applications (SENSORCOMM’ 08), pp. 839–844.
Aboba B (2003) Fast Handoff Issues. IEEE 802.11 Working Group, IEEE-03-155r0-I.
He B, Joshi S, Agrawal D, Sun D (2010) An efficient authenticated key establishment scheme for wireless mesh networks. IEEE Globecom Ad-hoc and Sensor Networking Symposium (GC10-AHSN).
Wei Y, Zeng K, Mohapatra P (2011) Adaptive Wireless Channel Probing for Shared Key Generation. IEEE Infocom 2011.
Sanzgiri K, Dahill B, Levine B, Shields C, Belding Royer E M (2002) A secure routing protocol for ad hoc networks. In Proceedings of 2002 IEEE International Conference on Network Protocols (ICNP), pp. 78–87.
Hu Y C, Johnson D B, Perrig A (2003) SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks, pp. 175–192.
Zapata M G, Asokan N (2002) Securing ad hoc routing protocols. In Proceedings of the 2002 ACM Workshop on Wireless Security (WiSe 2002), pp. 1–10.
Gerkis A (2006) A Survey of Wireless Mesh Networking Security Technology and Threats. http://www.sans.org/reading room/whitepapers/honors/survey-wireless-mesh-networking-security-technology-threats 1657. Accessed 9 December, 2010.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2013 Higher Education Press, Beijing and Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Lee, Cw. (2013). Security in Wireless Mesh Networks. In: Wireless Network Security. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36511-9_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-36511-9_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-36510-2
Online ISBN: 978-3-642-36511-9
eBook Packages: Computer ScienceComputer Science (R0)