CFP last date
20 December 2024
Reseach Article

A Brief Review on Security and Privacy Issues in Wireless Mesh Networks

by Priyanka Patel, Abhay Kothari
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 144 - Number 4
Year of Publication: 2016
Authors: Priyanka Patel, Abhay Kothari
10.5120/ijca2016910230

Priyanka Patel, Abhay Kothari . A Brief Review on Security and Privacy Issues in Wireless Mesh Networks. International Journal of Computer Applications. 144, 4 ( Jun 2016), 6-9. DOI=10.5120/ijca2016910230

@article{ 10.5120/ijca2016910230,
author = { Priyanka Patel, Abhay Kothari },
title = { A Brief Review on Security and Privacy Issues in Wireless Mesh Networks },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2016 },
volume = { 144 },
number = { 4 },
month = { Jun },
year = { 2016 },
issn = { 0975-8887 },
pages = { 6-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume144/number4/25165-2016910230/ },
doi = { 10.5120/ijca2016910230 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:46:41.601011+05:30
%A Priyanka Patel
%A Abhay Kothari
%T A Brief Review on Security and Privacy Issues in Wireless Mesh Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 144
%N 4
%P 6-9
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In recent years wireless mesh networking has emerged as a promising technology to tackle the challenges of the next era of broadband services. It has offered the economical services in the field of medicine, defense, natural disasters and availability of Internet access in the remote areas etc. In this review paper, the fundamental security challenges and privacy concerns are analyzed. This paper also provides a brief detail about existing security architectures and technologies based on wireless mesh network.

References
  1. I. F. Akyildiz, X. Wang, and W. Wang, “Wireless Mesh Networks: A Survey,” Computer Networks J. (Elsevier), vol. 47, Mar. 2005, pp. 445C–487.
  2. A. A. Franklin and C. S. R. Murthy, “An introduction to wireless mesh networks”, book chapter in: Security in Wireless Mesh Networks, Y. Zhang et al. (eds.), CRC Press, USA, pp. 3 – 44. 2007.
  3. R. Malik, M. Mittal, I. Batra, and C. Kiran, “Wireless Mesh Networks (WMN)”, International Journal of Computer Applications, vol. 1, no. 23, 2011, pp 68-76.
  4. A. O. Durahim, E. Savaş, “A-MAKE: An Efficient, Anonymous and Accountable Authentication Framework for WMNs”, In the Proceedings of the 5th International Conference on Internet Monitoring and Protection (ICIMP), Barcelona, Spain, 2010, pp. 54-59.
  5. Y. Zhang, J. Luo and H. Hu, “ Wireless Mesh Networking: Architectures, Protocols and Standards”, Auerbach Publications, ISBN: 978-0- 8493-7399-2, 2006.
  6. A. Naveed, S. S. Kanhere, and S. K. Jha, “Attacks and Security Mechanisms Security in Wireless Mesh Networks”, Ed (Y. Zhang), Auerbach Publications, ISBN: 978-0-8493-8250-5, 2009.
  7. I. Akyildiz and X. Wang, “Wireless Mesh Networks (Advanced Texts in Communications and Networking”, John Wiley & Sons Ltd. ISBN: 978-0-040-03256-5,2009.
  8. R. Malik, M. Mittal, I. Batra, and C. Kiran, “Wireless Mesh Networks (WMN)”, International Journal of Computer Applications, vol. 1, no. 23, 2011, pp 68-76.
  9. D. Bansal, S. Sofat, P. Pathak, S. Bhoot, “Detecting MAC Misbehavior Switching Attacks in Wireless Mesh Networks”, International Journal of Computer Applications, vol. 26, no.5, July 2011, pp. 55-62.
  10. S. Glass, M. Portmann, and V. Muthukkumarasamy, “Securing Wireless Mesh Networking”, IEEE Internet Computing, vol. 12, no. 4, 2008, pp. 30-36.
  11. H. S. Soliman and M. Omari, “Application of synchronous dynamic encryption system in mobile wireless domains”, in Proceedings of the 1st ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks (Q2SWinet’05), Montreal, Quebec, Canada, pp. 24-30, 2005, ACM Press.
  12. F. Martignon, S. Paris, and A. Capone, “MobiSEC: a novel security architecture for wireless mesh networks”, in Proceedings of the 4th ACM Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet’08), pp. 35-42, Vancouver, Canada, 2008.
  13. J. Konorski and M. Kurant, “Application of a hash function to discourage MAC-layer misbehaviour in wireless LANS”, in Journal of Telecommunications and Information Technology, vol 2, pp. 38-46, 2004.
  14. Y.-C. Hu, A, Perrig, and D. Johnson, “Ariadne: a secure on-demand routing protocol for ad hoc networks”, in Proceedings of ACM Annual International Conference on Mobile Computing (MobiCom’02), pp. 21 – 38, Atlanta, GA, USA, September 2002.
  15. P. Papadimitratos and Z. J. Haas, “Secure routing for mobile ad hoc networks”, in Proceedings of the SCS Communication Networks and Distributed Systems Modelling and Simulation Conference (CNDS’02), San Antonio, TX, USA, pp. 27-31, January 2002.
  16. M. G. Zapata and N. Asokan, “Securing ad hoc routing protocols”, in Proceedings of the 1st ACM Workshop on Wireless Security (WiSe’02), Atlanta, GA, USA, pp. 1-10, September 2002. ACM Press.
  17. Y.-C. Hu, D.B. Johnson, and A. Perrig, "SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks”, in Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA’02), Callicoon, NY, USA, pp. 3 – 13, June 2002.
  18. K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields, and E.M. Belding-Royer, “A secure routing protocol for ad hoc networks”, in Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP’02), Paris, France, pp. 78 – 87, November 2002.
  19. P. Papadimitratos and Z.J. Haas, “Secure data transmission in mobile ad hoc networks”, in Proceedings of the 2nd ACM Workshop on Wireless Security (WiSe’03), San Diego, CA, USA, pp. 41-50, September 2003.
  20. Y. Zhang and Y. Fang, “ARSA: an attack-resilient security architecture for multihop wireless mesh networks”, IEEE Journal of Selected Areas in Communication, vol 24, no 10, pp. 1916–1928, 2006.
  21. B. He, S. Joshi, D. P. Agrawal, and D. Sun, “An efficient authenticated key establishment scheme for wireless mesh networks”, in Proceedings of IEEE Global Telecommunications Conference (GLOBECOM’10), pp. 1-5, Miami, Florida, USA, 2010.
  22. H. Zhu, X. Lin, R. Lu, P.-H. Ho, and X. Shen, “SLAB: A secure localized authentication and billing scheme for wireless mesh networks”, IEEE Transactions on Wireless Communications, vol 7, no 10, pp. 3858–3868, October 2008.
  23. K. Ren, S. Yu, W. Lou, and Y. Zhang, “PEACE: a novel privacy-enhanced yet accountable security framework for metropolitan wireless mesh networks”, in IEEE Transactions on Parallel and Distributed Systems, vol 21, no 2, pp. 203–215, February 2010.
  24. J. Sun, C. Zhang, Y. Fang, “A security architecture achieving anonymity and traceability in wireless mesh networks”, in Proceedings of the 27th IEEE International Conference on Computer Communications (IEEE INFOCOM’08), pp. 1687–1695, April 2008.
  25. J. Sun, C. Zhang, Y. Zhang, and Y. Fang, “SAT: A security architecture achieving anonymity and traceability in wireless mesh networks”, IEEE Transactions on Dependable and Secure Computing, vol 8, no 2, pp. 295–307, March 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Mesh Network (WMN) Security Challenges Privacy Architectures and Broadband Services etc.