CFP last date
20 December 2024
Reseach Article

Survey on Attacks Pertaining to Wireless Mesh Networks and Approach towards Counter Measures

by Sandeep Dalal, Seema Devi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 149 - Number 12
Year of Publication: 2016
Authors: Sandeep Dalal, Seema Devi
10.5120/ijca2016911662

Sandeep Dalal, Seema Devi . Survey on Attacks Pertaining to Wireless Mesh Networks and Approach towards Counter Measures. International Journal of Computer Applications. 149, 12 ( Sep 2016), 20-26. DOI=10.5120/ijca2016911662

@article{ 10.5120/ijca2016911662,
author = { Sandeep Dalal, Seema Devi },
title = { Survey on Attacks Pertaining to Wireless Mesh Networks and Approach towards Counter Measures },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2016 },
volume = { 149 },
number = { 12 },
month = { Sep },
year = { 2016 },
issn = { 0975-8887 },
pages = { 20-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume149/number12/26050-2016911662/ },
doi = { 10.5120/ijca2016911662 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:54:34.989145+05:30
%A Sandeep Dalal
%A Seema Devi
%T Survey on Attacks Pertaining to Wireless Mesh Networks and Approach towards Counter Measures
%J International Journal of Computer Applications
%@ 0975-8887
%V 149
%N 12
%P 20-26
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless Mesh Networks (WMN) is an integral broadband wireless network who provides high bandwidth internet service to users. It is kind of multi-hop networks having many to many connections with the capability of dynamic sanify network topology. WMN’s utility network performance can cause a massive fall. Channel your physical security vulnerabilities, due to the dynamic changes of topology is a major challenging issue. Self –Configuration is a wireless mesh network self-organized nature make it vulnerable to various type of more attacks .In this paper we have discussed Some attacks that TCP / IP model are performed at different layers of security challenges, analyzing the counter remedies and protection mechanisms in place various attacks listed. Some attacks that TCP / IP model, are performed at different layers of security challenges, analyzing the counter remedies and protection mechanisms in place various attacks listed.

References
  1. Ho Ting Cheng, Hai Jiang and WeihuaZhuang , “Distributed medium access control for wireless mesh networks” , Wirel. Commun.Mob.Comput. 2006;:845–864 Published online in Wiley InterScience (www.interscience.wiley.com). DOI: 10.1002/wcm.445.
  2. Shin-Ming Cheng, Phone Lin, Di-Wei Huang and Shun-Ren Yang, “A Study on Distributed/Centralized Scheduling for Wireless Mesh Networks”, IWCMC’06, July 3–6, pp 599-604, 2006, Vancouver, British Columbia, Canada.
  3. F. Akylidz, X. Wang and W. Wang, “Wireless Mesh Networks: A Survey” Comput. Net, vol. 47 no. 4, 445-487, 2005.
  4. Xiang Xu, Xianjie Wu, Zhi Yu. 2010. Application of Wireless Mesh Network in Campus Network. Second International Conference on Communication systems Networks and applications. pp.245-247.
  5. Thillaikarasi, Mary SairaBhanu, A Survey of Secure Routing Protocols for Wireless Mesh Networks; International Journal of Computer Applications (0975 – 8887) Volume 97– No.6, July 2014
  6. Monika Department of computer science, “Denial of Service Attacks in Wireless Mesh Networks”, International Journal of Computer Science and Information Technologies, Vol. 3 (3), 2012, pp 4516-4522
  7. SachinDevKanawat, Pankaj Singh Parihar, “Attacks in Wireless Networks”, International Journal of Smart Sensors and Adhoc Networks, Volume-1, Issue-1, 2011
  8. V.S.ShankarSriram, AshishPratap Singh, G.Sahoo, “Methodology for Securing Wireless LANs Against Wormhole Attack”, International Journal of Recent Trends in Engineering, Issue. 1, Vol. 1, May 2009
  9. Yongguang Zhang and Wenke Lee, “Security inMobile Ad-Hoc Networks,” In Book Ad Hoc Networks Technologies and Protocols, Springer, 2005.
  10. Dr. M.S.Aswal1, Paramjeet Rawat2, Tarun Kumar, Threats and Vulnerabilities in Wireless Mesh Networks, International Journal of Recent Trends in Engineering, Vol 2, No. 4, November 2009
  11. RatikaSachdeva, AashimaSingla, Survey on Privacy Issues and Security Attacks in WirelessMesh Networks, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 4, April 2013 ISSN: 2277 128X
  12. Anil Kumar Gankotiya1, Gurdit Sing, SahilSeth2. Attacks and their Counter Measures in Wireless Mesh Networks. Available: htttp://www.csjournals.com/IJITKM/Special.
  13. S. Seth, and A. Gankotiya, “Denial of Service Attacks and Detection Methods in Wireless Mesh Networks”, In the Proceedings of the 2010 International Conference on Recent Trends in Information, Telecommunication and Computing (ITC 2010), Koshi, Kerala, 2010 , pp. 238 –240.
  14. A. Naveed, S. S. Kanhere, and S. K. Jha, “Attacks and Security Mechanisms Security in Wireless Mesh Networks”, Ed (Y. Zhang), Auerbach Publications, ISBN: 978-0-8493-8250-5, 2009.
  15. H. Moustafa, U. Javaid. T. M. Rasheed, S. M. Senouci and D. Meddour, “A Panorama on Wireless Mesh Networks: Architectures, Applications and Technical Challenges”, In the Proceedings of the First International Workshop on Wireless mesh: moving towards applications (WIMESHNETs „06) , Waterloo, Canada, 2006.
  16. Y. Zhang, J. Luo and H. Hu, “ Wireless Mesh Networking: Architectures, Protocols and Standards”, Auerbach Publications, ISBN: 978-0- 8493-7399-2, 2006.
  17. B. Wu, J. Chen, and J.Wu, “A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks Wireless Network Security”, Y. Xiao, X. S. Shen, D.-Z. Du (Ed.), Springer, ISBN: 978-0-387-33112-6978-0-387-33112-6, 2007.
  18. D. Bansal, S. Sofat, and A. K. Gankotiya, “Selfish MAC Misbehaviour Detection in Wireless Mesh Networks”, In the Proceedings of 2010 International Conference on Advances in Computer Engineering (ACE 2010), Bangalore, Karnataka, India, 2010, pp. 130-133.
  19. H. Moustafa, “Providing authentication, trust, and privacy in wireless mesh networks”, book chapter in: Security in Wireless Mesh Networks. Y.Zhang et al. (eds.), pp. 261-295, CRC Press, USA, 2007.
  20. M. Aydos, T. Tanýk, Ç. K. Koç, “High-SpeedImplementation of an ECC-based WirelessAuthentication Protocol on an ARM Microprocessor”, IEE Pro.: Comms, Oct., 2001, pp 273-279.
  21. W. Diffie, M. Hellman, “New Directions in Cryptography”, IEEE Trans., on IT, Nov, 1976, pp.644-654.
  22. Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Efficient Security Mechanisms for Routing Protocols. In Proceedings of the 2003 Symposium on Network and Distributed Systems Security (NDSS ’03), February 2003.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Mesh Networks Wormhole attack Grey Hole attack Security Attack Challenges