Skip to main content

Security in Wireless Mesh Networks

  • Chapter
Wireless Network Security

Abstract

The rapid emergence of wireless electronics such as iPhone and iPad has changed the way people communicate with each other. While wireless service providers continue to expand the capacity of their network infrastructures, one of the key components—wireless mesh network (WMN)—is expected to dominate the wireless interconnection and access networks. With wireless services integrated into our work and home activities, WMN security issues become evident. This chapter provides an extensive coverage on the security challenges, requirements, attacks, and countermeasure mechanisms that are related to wireless mesh networks. The treatment of these subjects is based on both theoretical analysis and practical application. In addition, cuttingedge wireless mesh network research projects and commercial products are discussed to provide technical insights for researchers and practitioners.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Faccin SM, Wijting C, Kenckt J, Damle A (2006) Mesh WLAN networks: concept and system design. IEEE Wireless Communications, 13(2): 10–17.

    Article  Google Scholar 

  2. Hiertz G R, Denteneer D, Max S, Taori R, Cardona J, Berlemann L, Walke B (2010) IEEE 802.11s: The WLAN Mesh Standard. IEEE Wireless Communications, 17(1): 104–111.

    Article  Google Scholar 

  3. Kraemer K L, Dedrick J, Sharma P (2011) One Laptop Per Child (OLPC): A Novel Computerization Movement. Proceedings of the 44th Hawaii International Conference on System Sciences, pp. 1–10.

    Google Scholar 

  4. Yarali A, Ahsant B, Rahman S (2009) Wireless Mesh Networking: A Key Solution for Emergency & Rural Applications. The Second International Conference on Advances in Mesh Networks (MESH 2009), pp. 143–149.

    Google Scholar 

  5. IEEE P802.11—Task Group S (2011) Status of Project IEEE 802.11s Mesh Networking. http://www.ieee802.org/11/Reports/tgs update.htm. Accessed 30 June, 2011.

    Google Scholar 

  6. Carrano R C, MagalhĂŁes LCS, Saade DCM, Albuquerque CVN (2011) IEEE 802.11s Multihop MAC: A Tutorial. IEEE Communications Surveys & Tutorials, 13(1).

    Google Scholar 

  7. Salem N B, Hubaux J P (2006) Securing wireless mesh networks. IEEE Wireless Communications, 13(2): 50–55.

    Article  Google Scholar 

  8. Glass S, Portmann M, Muthukkumarasamy V (2008) SecuringWireless Mesh Networks. IEEE Internet Computing, 12(4): 30–36.

    Article  Google Scholar 

  9. Zhang W, Wang Z, Das S K, Hassan M (2007) Security Issues in Wireless Mesh Networks. Wireless Mesh Networks, pp. 309–330.

    Google Scholar 

  10. IEEE 802.11 Working Group (2007) IEEE Standard for Information Technology— Telecommunications and Information Exchange between Systems— Local and Metropolitan Area Networks—Specific Requirements—Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications.

    Google Scholar 

  11. Edney J, Arbaugh W A (2004) Real 802.11 Security: Wi-Fi Protected Access and 802.11i. Addison-Wesley Professional, Boston.

    Google Scholar 

  12. Frankel S, Eydt B, Owens L, Scarfone K (2007) Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i. Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-97.

    Google Scholar 

  13. Kurose J F, Ross KW(2010) Computer Networking: A Top-Down Approach (5th edition). Wesley, New York.

    Google Scholar 

  14. IEEE Standard for Local and metropolitan area networks (2004) 802.1X: Port — Based Network Access Control.

    Google Scholar 

  15. Aboba B, Blunk L, Vollbrecht J, Carlson J, Levkowetz H (2004) IETF RFC 3748: Extensible Authentication Protocol (EAP).

    Google Scholar 

  16. Simon D, Aboba B, Hurst R (2008) IETF RFC 5216: The EAP-TLS Authentication Protocol.

    Google Scholar 

  17. Haverinen H, Salowey J (2006) IETF RFC 4186: Extensible Authentication Protocol Method for Global System for Mobile Communications (GSM) Subscriber Identity Modules (EAP-SIM).

    Google Scholar 

  18. Rigney C, Willens S, Rubens A, Simpson W (2000) IETF RFC2865: Remote Authentication Dial-In User Service (RADIUS).

    Google Scholar 

  19. Harkins D (2008) Simultaneous Authentication of Equals: A Secure, Password-Based Key Exchange for Mesh Networks. In Proceedings of the Second International Conference on Sensor Technologies and Applications (SENSORCOMM’ 08), pp. 839–844.

    Google Scholar 

  20. Aboba B (2003) Fast Handoff Issues. IEEE 802.11 Working Group, IEEE-03-155r0-I.

    Google Scholar 

  21. He B, Joshi S, Agrawal D, Sun D (2010) An efficient authenticated key establishment scheme for wireless mesh networks. IEEE Globecom Ad-hoc and Sensor Networking Symposium (GC10-AHSN).

    Google Scholar 

  22. Wei Y, Zeng K, Mohapatra P (2011) Adaptive Wireless Channel Probing for Shared Key Generation. IEEE Infocom 2011.

    Google Scholar 

  23. Sanzgiri K, Dahill B, Levine B, Shields C, Belding Royer E M (2002) A secure routing protocol for ad hoc networks. In Proceedings of 2002 IEEE International Conference on Network Protocols (ICNP), pp. 78–87.

    Google Scholar 

  24. Hu Y C, Johnson D B, Perrig A (2003) SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks, pp. 175–192.

    Google Scholar 

  25. Zapata M G, Asokan N (2002) Securing ad hoc routing protocols. In Proceedings of the 2002 ACM Workshop on Wireless Security (WiSe 2002), pp. 1–10.

    Google Scholar 

  26. Gerkis A (2006) A Survey of Wireless Mesh Networking Security Technology and Threats. http://www.sans.org/reading room/whitepapers/honors/survey-wireless-mesh-networking-security-technology-threats 1657. Accessed 9 December, 2010.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Higher Education Press, Beijing and Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Lee, Cw. (2013). Security in Wireless Mesh Networks. In: Wireless Network Security. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36511-9_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-36511-9_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-36510-2

  • Online ISBN: 978-3-642-36511-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics