Skip to main content

Secure Mechanism for Handling Targeted Attacks in Infrastructure Based Wireless Mesh Networks

  • Conference paper
Information Security and Assurance (ISA 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 76))

Included in the following conference series:

  • 1073 Accesses

Abstract

Infrastructure based Wireless mesh networks allow heterogeneous types of networks to be connected at a time through wireless mesh routers. Since the nodes of every network have different processing power, bandwidth, amount of energy etc. so this situation can lead to targeted attacks. An Internet connected node can easily generate flood over a node of sensor network. So to handle these types of attacks we in this paper introduced a new secure authentication mechanism that works when a potential of attack is detected. Moreover we also authorized the nodes of the wireless mesh network to demand data according to their capacity by using pull data traffic control mechanism. We applied this solution first on mesh routers to discourage targeted attacks and secondly we applied the solution on an individual node that lies in between a node and mesh router.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akyildiz, I.F., Wang, X., Wang, W.: Wireless mesh networks: a survey Broad band and Wireless Networking, (BWN) Lab. School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta (January 1, 2005)

    Google Scholar 

  2. Dilmaghani, R.B., Rao, R.R.: Hybrid Wireless Mesh Network with Application to Emergency Scenarios. Journal of Software 3(2), 52–60 (2008)

    Article  Google Scholar 

  3. Yan, W., Ren, M., Zhao, T., Li, X.: A Bandwidth Management Scheme Support for Real-time Applications in Wireless Mesh Networks. In: ACM symposium on Applied computing Computer networks, Fortaleza, Ceara, Brazil, pp. 2063–2068 (2008)

    Google Scholar 

  4. Akyidiz, I.F., Wang, X., Wang, W.: Wireless Mesh Network: a Survey. The International Journal of Computer and Telecommunications Networking 47(4), 445–487 (2004)

    Google Scholar 

  5. Mynampati, V., Kandula, D., Garimilla, R., Srinivas, K.: Performance and Security of Wireless Mesh Networks, Blekinge Institute of Technology (June 2009)

    Google Scholar 

  6. Kone, V., Das, S., Zhao, B.Y., Zheng, H.: QUORUM: quality of service in wireless mesh networks. Mobile Networks and Applications 12(5), 358–369 (2007)

    Article  Google Scholar 

  7. Hugelshofer, F., Smith, P., Hutchison, D., Race, N.J.P.: OpenLIDS: A Light weight Intrusion Detection System for Wireless Mesh Networks. In: International Conference on Mobile Computing and Networking, Beijing, China (2009)

    Google Scholar 

  8. YeYan, JiannongCao, ZhuLi: Stochastic Security Performance of Active Cache Based Defense against DoS Attacks in Wireless Mesh Network. In: Second International Conference on Advances in Mesh Networks, Athens/Glyfada, Greece (2009)

    Google Scholar 

  9. XiaWang, Wong, J.S., Stanley, F., SamikBasu: Cross-layer Based Anomaly Detection in Wireless Mesh Networks. In: Ninth Annual International Symposium on Applications and the Internet, Washington, DC, USA (2009)

    Google Scholar 

  10. KuiRen, ShuchengYu, WenjingLou, YanchaoZhang: PEACE: Privacy-Enhancement Yet Accountable Security Framework. IEEE transactions on parallel and distributed systems 21(2), 1045–9219 (2010)

    Google Scholar 

  11. Bezahaf, M., Ianonne, L.: Practical DHT-Based Location Service for Wireless Mesh Networks. In: International Conference on Emerging Networking Experiments and Technologies, Rome, Italy, pp. 47–48 (2009)

    Google Scholar 

  12. Khan, Z.S., Sher, M., Rashid, K., Rahim, A.: A Three-Layer Secure Architecture for IP Multimedia Subsystem-Based Instant Messaging. Information Security Journal: A Global Perspective 18(3), 139–148 (2009)

    Article  Google Scholar 

  13. Khan, Z.S., Rashid, K., Muhaya, F.B., Qutbuddin, Rahim, A.: Realization of call back authentication for web to cellular phone SMS communication. In: Computer and Mathematics with Application. Elsevier, Amsterdam (2009), doi:10.1016/j.camwa.2009.12.038

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Shafi, R., Rahim, A., bin Muhaya, F., Ashraf, S., Sher, M. (2010). Secure Mechanism for Handling Targeted Attacks in Infrastructure Based Wireless Mesh Networks. In: Bandyopadhyay, S.K., Adi, W., Kim, Th., Xiao, Y. (eds) Information Security and Assurance. ISA 2010. Communications in Computer and Information Science, vol 76. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13365-7_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-13365-7_23

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-13364-0

  • Online ISBN: 978-3-642-13365-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics