This document provides an overview of contemporary security problems in wireless mesh networks. It discusses security vulnerabilities at different layers of the communication protocol stack for wireless mesh networks, including the physical, link, and network layers. At the physical layer, jamming attacks are a risk. The link layer is vulnerable to passive eavesdropping, spoofing, congestion attacks, and replay attacks. The network layer faces risks from routing attacks like black hole and gray hole attacks, as well as Sybil attacks. Overall, the document analyzes different types of attacks that threaten the security of wireless mesh networks.
Serial Communication Interface with Error Detectioniosrjce
UART is used for serial data communication. UART is a piece of computer hardware that translates
between parallel bits of data and serial bits. UART is usually an integrated circuit used for serial
communications over a computer or peripheral device serial port. Bits have to be moved from one place to
another using wires or some other medium. Over many miles, the expense of the wires becomes large. To reduce
the expense of long communication links carrying several bits in parallel, data bits are sent sequentially. Errors
may occur either internally or externally while we transmit information from source to destination. The errors
generated during the transmission would affect the performance of the overall system. In order to reduce the
errors we should incorporate any error detecting schemes like hamming decoder, check parity systems etc.
Different serial communication devices are available.
Sustainable Lightweight Wireless Communication StackIJERA Editor
A light weight wireless communication stack based on wireless communication establishment. It handles data received over the air and send serially with security checking and acknowledgement. Also it transmits data over the air which is received serially with security checking and acknowledgement. It gives status of alive routers on coordinator’s UART port.
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
Mobile ad-hoc networks require anonymous communications in order to thwart new wireless passive attacks; and to protect new
assets of information such as nodes locations, motion patterns, network topology and traffic patterns in addition to conventional identity and
message privacy. The transmitted routing messages and cached active routing entries leave plenty of opportunities for eavesdroppers.
Anonymity and location privacy guarantees for the deployed ad hoc networks are critical in military and real time communication systems,
otherwise the entire mission may be compromised. This poses challenging constraints on MANET routing and data forwarding. To address
the new challenges, several anonymous routing schemes have been proposed recently.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability
https://www.ijmst.com/
IJMST Volume 1 Issue 1, Manuscript 4
As the popularity of mobile devices and wireless networks significantly increased over the
past years. The wireless adhoc network has now become one of the most vibrant and active
fields of communication and networking research. These networks are a new generation of
networks offering unrestricted mobility without any underlying infrastructure. As their
principle application is in disastrous environments, security is critical. Various challenges are
faced in the adhoc environment, mostly due to the resource poorness of these networks. One
man confront in the design of these networks is their vulnerability to security attacks. The
solutions for conventional networks are usually not sufficient to provide efficient adhoc
operations. Just because of its wireless nature of communication and lack of any security
infrastructure raise several security problems and threats.
In this paper, we briefly review the threats an adhoc network faces and the security goals to
be achieved. Moreover, it also presents existing security schemes used in wireless adhoc
networks in order to handle security threats.
Wireless ad hoc networks are autonomous nodes that communicate with each other in a
decentralized manner through multi hop radio network. Wireless nodes form a dynamic network
topology and communicate with each other directly without wireless access point. Wireless networks
are particularly vulnerable to intrusions, as they operate in open medium, and use cooperative
strategies for network communication.
Serial Communication Interface with Error Detectioniosrjce
UART is used for serial data communication. UART is a piece of computer hardware that translates
between parallel bits of data and serial bits. UART is usually an integrated circuit used for serial
communications over a computer or peripheral device serial port. Bits have to be moved from one place to
another using wires or some other medium. Over many miles, the expense of the wires becomes large. To reduce
the expense of long communication links carrying several bits in parallel, data bits are sent sequentially. Errors
may occur either internally or externally while we transmit information from source to destination. The errors
generated during the transmission would affect the performance of the overall system. In order to reduce the
errors we should incorporate any error detecting schemes like hamming decoder, check parity systems etc.
Different serial communication devices are available.
Sustainable Lightweight Wireless Communication StackIJERA Editor
A light weight wireless communication stack based on wireless communication establishment. It handles data received over the air and send serially with security checking and acknowledgement. Also it transmits data over the air which is received serially with security checking and acknowledgement. It gives status of alive routers on coordinator’s UART port.
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
Mobile ad-hoc networks require anonymous communications in order to thwart new wireless passive attacks; and to protect new
assets of information such as nodes locations, motion patterns, network topology and traffic patterns in addition to conventional identity and
message privacy. The transmitted routing messages and cached active routing entries leave plenty of opportunities for eavesdroppers.
Anonymity and location privacy guarantees for the deployed ad hoc networks are critical in military and real time communication systems,
otherwise the entire mission may be compromised. This poses challenging constraints on MANET routing and data forwarding. To address
the new challenges, several anonymous routing schemes have been proposed recently.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability
https://www.ijmst.com/
IJMST Volume 1 Issue 1, Manuscript 4
As the popularity of mobile devices and wireless networks significantly increased over the
past years. The wireless adhoc network has now become one of the most vibrant and active
fields of communication and networking research. These networks are a new generation of
networks offering unrestricted mobility without any underlying infrastructure. As their
principle application is in disastrous environments, security is critical. Various challenges are
faced in the adhoc environment, mostly due to the resource poorness of these networks. One
man confront in the design of these networks is their vulnerability to security attacks. The
solutions for conventional networks are usually not sufficient to provide efficient adhoc
operations. Just because of its wireless nature of communication and lack of any security
infrastructure raise several security problems and threats.
In this paper, we briefly review the threats an adhoc network faces and the security goals to
be achieved. Moreover, it also presents existing security schemes used in wireless adhoc
networks in order to handle security threats.
Wireless ad hoc networks are autonomous nodes that communicate with each other in a
decentralized manner through multi hop radio network. Wireless nodes form a dynamic network
topology and communicate with each other directly without wireless access point. Wireless networks
are particularly vulnerable to intrusions, as they operate in open medium, and use cooperative
strategies for network communication.
Intelligent Device TO Device Communication Using IoTIJCERT
Internet is becoming the most intrinsic part of the human life. There are many users of the internet but the devices will be the main users in the Internet of Things (IoT). These devices communicate with each other efficiently and gather the information to transfer the data to particular device. The quality of this information depends on how smart the devices are. IoT coverage is very wide and consists of the things or devices connected in network like camera, android phones, sensors etc. Once all these devices are connected with each other, they are capable of processing smartly and satisfying basic needs of environment. Thus the communication between the devices is achieved using various technologies and devices.
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents sharing of information which can be local or remote. Though local communications may occur face to face between individuals remote communications take place among people over long distances. Mobile ad hoc networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as router. In order to send data, the source node initiates a routing process by using a routing protocol. The nature of the wireless medium is always insecure. So, during routing many attacks can take place. The main objective of an eavesdropper is to grab the confidential information in the network. This secret information is used by a malicious node to perform further attacks. Here, the entire problem lies in identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper, we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found that the network performance degrades in presence of an eavesdropper.
Attacks Prevention and Detection Techniques In MANET: A SurveyIJERA Editor
Wireless sensor network is a set of distributed sensor nodes. Which are randomly deployed in geographical area
to capture climatic changes like temperature, humidity and pressure. In Wireless Network MANET is a Mobile
Ad-Hoc Networks which is a one self-configurable network. MANET is a collection of Wireless mobile node
which is dynamically moves from one location to another location. Both attacks Active as well as Passive
attacks is in MANET. It doesn’t have a static structure. Security for wireless network is much difficult as
compare to wired networks. In last few years many security and attacks issue are face many researchers in
MANET. Attacks like Packet dropping attack, Black-Hole attack, Denial of Service attack, wormhole attacks
and Packet modification attacks found in MANET. At the time of data communication all the above mentioned
attacks access data easily without permission. To solve the problem of attacks in MANET and secure data
communication use Intrusion Detection System. In This paper propose the survey of different kinds of attacks
on MANET and Wireless sensor networks. This paper helps to young researcher for implement new hybrid
algorithm for secure intrusion detection in MANET.
Forestalling Meticulous Jam Attacks Using Packet-Hiding TechniquesEswar Publications
The open nature of the wireless medium leaves it liable to intentional interference attacks, generally said as jam.
This intentional interference with wireless transmissions is used as a launch pad for mounting Denial-of-Service attacks on wireless networks. Typically, jam has been self-addressed beneath associate external threat model.
However, adversaries with internal information of protocol specifications and network secrets will launch loweffort
jam attacks that are troublesome to notice and counter. during this work, we have a tendency to address the matter of jamming attacks in wireless networks. In these attacks, the resister is active just for a brief amount of your time, by selection targeting messages of high importance. In our work two offender nodes (node that creates jamming) and introduce one new node i.e sender node. The new node(jammer node) is at intervals the twenty five nodes. Victimization that new sender node we have to eliminate the offender nodes absolutely. We have a tendency to conclude that however jam happens within the network and approach of elimination of the offender nodes
victimization new sender node. We propose mistrial approach for avoid flooding packets in jammer network. We conclude the performance between the mistrial and damping approach for avoid jamming packets We have a tendency to illustrate the benefits of {selective jam|spot-jamming|jamming|electronic jamming|jam} in terms of network performance degradation and resister effort by to beat the sender in network with the assistance of recent jamming node. We illustrate the benefits of jam|spot-jamming|jamming|electronic-jamming|jam} in terms of network performance degradation and human effort by to beat the sender in network with the assistance of recent
jamming node.
1- Mobile ad hoc networks are formed dynamically by an
autonomous system of mobile nodes that are connected
via wireless links.
2- Multihop communication- node communicate with the
help of two or more node from source to destination.
3- No existing fixed infrastructure or centralized administration –No base station.
4- Mobile nodes are free to move randomly-Network topology changes frequently
5- May Operate as standalone fashion or also can be connected to the larger internet.
6- Each node work as router
Primary Goals of Security in MANET
To assure a reliable data transfer over the communication networks and to protect the system resources a number of security services are classified in five categories:-
1-Authentication:- The process of identifying an individual , usually based on a username and password.
2- Confidentially:- Confidentiality aims at protecting the data from disclosure to unauthorized person.
Network attacks against confidentiality
* Packet capturing
Password attack
Port scanning
Dumpster Diving
Wiretapping
Phishing and Pharming
2-Non repudiation:- Integrity guarantees that a message being transferred is never corrupted.
3- Integrity:- Integrity guarantees that a message being transferred is never corrupted.
network attack against integrity
Salami attack
trust relationship attacks
Man in the middle attack
Session hijacking attacks
4- Availability:- Its ensure that data ,network resources or network services are available to legitimate user when required.
network attack against availability
Denial of services attacks
Distributed denial of services attack
SYN flood attacks and ICMP flood attacks
Electrical power attacks
Server Room environment attacks
Key management
The security in networking is in many cases dependent on proper key management.
Key management consists of various services, of which each is vital for the security
of the networking systems
* Trust model:-Its must determine how much different element in the network can trust each other.
* Cryptosystem:- Public and symmetric key mechanism can be applied .
* Key creation:- It must determine which parties are allowed to generate key to themselves.
* Key storage :- In adhoc network any network element may have to store its own key and possibly key of other element as well.
* Key distribution:- The key management service must ensure that the generated keys are securely distributed to their owners.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
A mobile ad-hoc network (MANET) is very receptive to security attacks due to its open medium, dynamically changing network topology, lack of centralized monitoring. These vulnerabilities are nature of MANET structure that cannot be removed. As a consequence, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. One of the well known attack on the MANET is the Black Hole attack which is most common in the ondemand routing protocols such as AODV. A black hole attack refers to an attack by a malicious node, which forcibly gains the route from a source to a destination by the falsification of sequence number and hop count of the routing message. This paper represents an enhanced AOMDV routing protocol for avoiding black hole attack in MANET. This routing protocol uses Ad hoc On-demand Multipath Distance Vector (AOMDV) to form link disjoint multi-path during path discovery to provide better path selection in order to avoid malicious nodes in the path using legitimacy table maintained by each node in the network. Nonmalicious nodes steadily isolate the black hole nodes based on the values collected in their legitimacy table and avoid them while making path between source and destination. The effectiveness of our approach is illustrated by simulations conducted using network simulator ns-2.34.
Cryptography System for Online Communication Using Polyalphabetic Substitutio...Eswar Publications
Online communication is one of the common means of communication in this era of globe village. As the number of people being connected to online communication system through their mobile phone, computer or any other e-communication tools increases, there is need to secure the communication networks from adversaries (third parties) between the sender and receivers. There are many aspects to security approach in online communication environment. One essential aspect for secure communications is that of cryptography, which is the focus of this research. This research work aims at designing and implementing cryptosystem using a simple polyalphabetic cipher algorithm. The algorithm was coded with Java programming language. It was discovered that cryptography system with polyalphabetic cipher algorithm is better compared to Atbash cipher, Scytale cipher, Ceasar cipher etc, because it is very difficult for adversaries to decrypt an encrypted data without the key.
A Study on Access Point Selection Algorithms in Wireless Mesh NetworksEswar Publications
In IEEE 802.11 based wireless mesh network (WMN), a mesh client often finds multiple access points (AP) to associate with. How to select the best AP is the open research problem. The traditional AP selection method defined by IEEE 802.11 standard is based on received signal strength. This method is proven inefficient as it does not consider many important factors such as channel conditions, AP load, etc. Many alternate solutions have been proposed so far in the literature, but they are all focused on wireless local area network (WLAN) environment. As there are significant differences between WLAN and WMN, all these proposed association mechanisms must be redesigned to fit into WMN environment. This paper studies the AP selection problem in the context of WMN. We critically analyze the existing work and identify technical challenges involved in AP selection problem. This paper also provides directions to design the metrics of AP selection method in WMN.
Intelligent Device TO Device Communication Using IoTIJCERT
Internet is becoming the most intrinsic part of the human life. There are many users of the internet but the devices will be the main users in the Internet of Things (IoT). These devices communicate with each other efficiently and gather the information to transfer the data to particular device. The quality of this information depends on how smart the devices are. IoT coverage is very wide and consists of the things or devices connected in network like camera, android phones, sensors etc. Once all these devices are connected with each other, they are capable of processing smartly and satisfying basic needs of environment. Thus the communication between the devices is achieved using various technologies and devices.
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents sharing of information which can be local or remote. Though local communications may occur face to face between individuals remote communications take place among people over long distances. Mobile ad hoc networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as router. In order to send data, the source node initiates a routing process by using a routing protocol. The nature of the wireless medium is always insecure. So, during routing many attacks can take place. The main objective of an eavesdropper is to grab the confidential information in the network. This secret information is used by a malicious node to perform further attacks. Here, the entire problem lies in identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper, we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found that the network performance degrades in presence of an eavesdropper.
Attacks Prevention and Detection Techniques In MANET: A SurveyIJERA Editor
Wireless sensor network is a set of distributed sensor nodes. Which are randomly deployed in geographical area
to capture climatic changes like temperature, humidity and pressure. In Wireless Network MANET is a Mobile
Ad-Hoc Networks which is a one self-configurable network. MANET is a collection of Wireless mobile node
which is dynamically moves from one location to another location. Both attacks Active as well as Passive
attacks is in MANET. It doesn’t have a static structure. Security for wireless network is much difficult as
compare to wired networks. In last few years many security and attacks issue are face many researchers in
MANET. Attacks like Packet dropping attack, Black-Hole attack, Denial of Service attack, wormhole attacks
and Packet modification attacks found in MANET. At the time of data communication all the above mentioned
attacks access data easily without permission. To solve the problem of attacks in MANET and secure data
communication use Intrusion Detection System. In This paper propose the survey of different kinds of attacks
on MANET and Wireless sensor networks. This paper helps to young researcher for implement new hybrid
algorithm for secure intrusion detection in MANET.
Forestalling Meticulous Jam Attacks Using Packet-Hiding TechniquesEswar Publications
The open nature of the wireless medium leaves it liable to intentional interference attacks, generally said as jam.
This intentional interference with wireless transmissions is used as a launch pad for mounting Denial-of-Service attacks on wireless networks. Typically, jam has been self-addressed beneath associate external threat model.
However, adversaries with internal information of protocol specifications and network secrets will launch loweffort
jam attacks that are troublesome to notice and counter. during this work, we have a tendency to address the matter of jamming attacks in wireless networks. In these attacks, the resister is active just for a brief amount of your time, by selection targeting messages of high importance. In our work two offender nodes (node that creates jamming) and introduce one new node i.e sender node. The new node(jammer node) is at intervals the twenty five nodes. Victimization that new sender node we have to eliminate the offender nodes absolutely. We have a tendency to conclude that however jam happens within the network and approach of elimination of the offender nodes
victimization new sender node. We propose mistrial approach for avoid flooding packets in jammer network. We conclude the performance between the mistrial and damping approach for avoid jamming packets We have a tendency to illustrate the benefits of {selective jam|spot-jamming|jamming|electronic jamming|jam} in terms of network performance degradation and resister effort by to beat the sender in network with the assistance of recent jamming node. We illustrate the benefits of jam|spot-jamming|jamming|electronic-jamming|jam} in terms of network performance degradation and human effort by to beat the sender in network with the assistance of recent
jamming node.
1- Mobile ad hoc networks are formed dynamically by an
autonomous system of mobile nodes that are connected
via wireless links.
2- Multihop communication- node communicate with the
help of two or more node from source to destination.
3- No existing fixed infrastructure or centralized administration –No base station.
4- Mobile nodes are free to move randomly-Network topology changes frequently
5- May Operate as standalone fashion or also can be connected to the larger internet.
6- Each node work as router
Primary Goals of Security in MANET
To assure a reliable data transfer over the communication networks and to protect the system resources a number of security services are classified in five categories:-
1-Authentication:- The process of identifying an individual , usually based on a username and password.
2- Confidentially:- Confidentiality aims at protecting the data from disclosure to unauthorized person.
Network attacks against confidentiality
* Packet capturing
Password attack
Port scanning
Dumpster Diving
Wiretapping
Phishing and Pharming
2-Non repudiation:- Integrity guarantees that a message being transferred is never corrupted.
3- Integrity:- Integrity guarantees that a message being transferred is never corrupted.
network attack against integrity
Salami attack
trust relationship attacks
Man in the middle attack
Session hijacking attacks
4- Availability:- Its ensure that data ,network resources or network services are available to legitimate user when required.
network attack against availability
Denial of services attacks
Distributed denial of services attack
SYN flood attacks and ICMP flood attacks
Electrical power attacks
Server Room environment attacks
Key management
The security in networking is in many cases dependent on proper key management.
Key management consists of various services, of which each is vital for the security
of the networking systems
* Trust model:-Its must determine how much different element in the network can trust each other.
* Cryptosystem:- Public and symmetric key mechanism can be applied .
* Key creation:- It must determine which parties are allowed to generate key to themselves.
* Key storage :- In adhoc network any network element may have to store its own key and possibly key of other element as well.
* Key distribution:- The key management service must ensure that the generated keys are securely distributed to their owners.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
A mobile ad-hoc network (MANET) is very receptive to security attacks due to its open medium, dynamically changing network topology, lack of centralized monitoring. These vulnerabilities are nature of MANET structure that cannot be removed. As a consequence, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. One of the well known attack on the MANET is the Black Hole attack which is most common in the ondemand routing protocols such as AODV. A black hole attack refers to an attack by a malicious node, which forcibly gains the route from a source to a destination by the falsification of sequence number and hop count of the routing message. This paper represents an enhanced AOMDV routing protocol for avoiding black hole attack in MANET. This routing protocol uses Ad hoc On-demand Multipath Distance Vector (AOMDV) to form link disjoint multi-path during path discovery to provide better path selection in order to avoid malicious nodes in the path using legitimacy table maintained by each node in the network. Nonmalicious nodes steadily isolate the black hole nodes based on the values collected in their legitimacy table and avoid them while making path between source and destination. The effectiveness of our approach is illustrated by simulations conducted using network simulator ns-2.34.
Cryptography System for Online Communication Using Polyalphabetic Substitutio...Eswar Publications
Online communication is one of the common means of communication in this era of globe village. As the number of people being connected to online communication system through their mobile phone, computer or any other e-communication tools increases, there is need to secure the communication networks from adversaries (third parties) between the sender and receivers. There are many aspects to security approach in online communication environment. One essential aspect for secure communications is that of cryptography, which is the focus of this research. This research work aims at designing and implementing cryptosystem using a simple polyalphabetic cipher algorithm. The algorithm was coded with Java programming language. It was discovered that cryptography system with polyalphabetic cipher algorithm is better compared to Atbash cipher, Scytale cipher, Ceasar cipher etc, because it is very difficult for adversaries to decrypt an encrypted data without the key.
A Study on Access Point Selection Algorithms in Wireless Mesh NetworksEswar Publications
In IEEE 802.11 based wireless mesh network (WMN), a mesh client often finds multiple access points (AP) to associate with. How to select the best AP is the open research problem. The traditional AP selection method defined by IEEE 802.11 standard is based on received signal strength. This method is proven inefficient as it does not consider many important factors such as channel conditions, AP load, etc. Many alternate solutions have been proposed so far in the literature, but they are all focused on wireless local area network (WLAN) environment. As there are significant differences between WLAN and WMN, all these proposed association mechanisms must be redesigned to fit into WMN environment. This paper studies the AP selection problem in the context of WMN. We critically analyze the existing work and identify technical challenges involved in AP selection problem. This paper also provides directions to design the metrics of AP selection method in WMN.
IOSR Journal of Pharmacy and Biological Sciences(IOSR-JPBS) is an open access international journal that provides rapid publication (within a month) of articles in all areas of Pharmacy and Biological Science. The journal welcomes publications of high quality papers on theoretical developments and practical applications in Pharmacy and Biological Science. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADEIJTET Journal
ABSTRACT - Wireless Mesh Networks (WMNs) have emerged as a promising technology because of their wide range of
applications. Wireless mesh networks wireless mesh networks (WMNs) are dynamically self – organizing, self –
configuring, self – healing with nodes in the network automatically establishing an adHoc network and maintaining mesh
connectivity. Because of their fast connectivity wireless mesh networks (WMNs) is widely used in military applications.
Security is the major constrain in wireless mesh networks (WMNs). This paper considers a special type of DoS attack
called selective forwarding attack or greyhole attack. With such an attack, a misbehaving mesh router just forwards few
packets it receives but drops sensitive data packets. To mitigate the effect of such attack an approach called FADE :
Forward Assessment based Detection is adopted. FADE scheme detects the presence of attack inside the network by
means of two-hop acknowledgment based monitoring and forward assessment based detection. FADE operates in three
phases and analyzed by determining optimal threshold values. This approach is found to provide effective defense against
the collaborative internal attackers in WMNs.
A Protocol/Scheme to mitigate DDos attacks using AODV Protocolijsrd.com
MANET(Mobile Adhoc Network) is an emerging technology and have great strength to be applied in battlefields and commercial applications such as traffic surveillance, MANET is infrastructure less without any centralized controller. Each node contains routing capability. Each device in a MANET is independent and can move in any direction. One of the major challenges wireless mobile ad-hoc networks face today is security, because no central controller exists. MANETs are a kind of wireless ad hoc networks that usually has a routable networking environment on top of a link layer ad hoc network. There are many security attacks in MANET and DDoS (Distributed denial of service) is one of them. Our main objective is seeing the effect of DDoS in routing, Packet Drop Rate, End to End Delay, no. of Collisions due to attack on network. And with these parameters and many more also we build secure IDS to detect this kind of attack and block it. In this thesis main objective is to study and implement the security against the DDOS attack. DDoS (Distributed Denial of Service) attacks in the networks are required to be prevented, as early as possible before reaching the victim node. DDos attack causes depletion of the network resources such as network bandwidth, disk space, CPU time, data structures, and network connections. Dealing with DDoS attacks is difficult due to their properties such as dynamic attack rates, big scale of botnets. DDos attack become more difficult to handle if it occurs in wireless network because of the properties of ad hoc network such as dynamic topologies, low battery life, Unicast routing Multicast routing , Frequency of updates or network overhead , scalability , mobile agent based routing ,power aware routing etc. Thus it is better to prevent the distributed denial of service attack rather than allowing it to occur and then taking the necessary steps to handle it. The following quantitative metrics Packet Delivery Ratio (PDR), Number of Collisions are to be used to evaluate the performance of DDoS attacks and their prevention techniques under different combinations in the fixed mobile ad hoc network. In our simulation, the effect of DDoS attacks under different number of attackers is studied.
Mobile ad hoc networks (MANETs) are collections of self-organizing mobile nodes with dynamic topologies and no centralized authority. Each node participating in the network acts both as host and a router. So each node can participate to transfer data packet to destination node but suppose one node in network is removed at time it is very difficult to maintain the information about all node. The main advantage and disadvantage of MANETs provides large number of degree of freedom and self-organizing capability of that make it completely different from other network. Due to the nature of MANETs, to design and development of secure routing is challenging task for researcher in an open and distributed communication environments. In MANET, the more security is required in comparison to wired network. If source node chooses this fake route, malicious nodes have the option of delivering the packets or dropping them.
Keywords: MANETs, Security, Cryptography.
In our research work we are improving the performance of mobile ad hoc networks under jamming attack by using an integrated approach. The proposed work includes a network with high mobility, using IEEE Along g standard jamming attacks and countermeasures in wireless sensor networks
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...IJNSA Journal
The wireless and dynamic nature of mobile ad hoc networks (MANETs) leaves them more vulnerable to security attacks than their wired counterparts. The nodes act both as routers and as communication end points. This makes the physical layer more prone to security attacks. The MANET physical layer is challenging to DoS attack and also some passive attacks. The physical layer protocol in MANETs is responsible for bit-level transmission between network nodes. The proposed model combines spread spectrum technology Direct Sequence Spread Spectrum (DSSS) with key management technique ISAKMP to defend against signal jamming denial-of-service attacks in physical layer of MANET.DSSS with ISAKMP is found to be a good security solution even with its known security problems. The simulation is done using network simulator qualnet 5.0 for different number of mobile nodes. The proposed model has shown improved results in terms of Average throughput, Average end to end delay, Average packet delivery ratio, and Average jitter.
Even in difficult places to reach, the new networking technique allows the easy deployment of sensor networks although these wireless sensor networks confront a lot of constraints. The major constraint is related to the quality of information sent by the network. The wireless sensor networks use different methods to achieve data to the base station. Data aggregation is an important one, used by these wireless sensor networks. But this aggregated data can be subject to several types of attacks and provides security is necessary to resist against malicious attacks, secure communication between severely resource constrained sensor nodes while maintaining the flexibility of the topology changes. Recently, several secure data aggregation schemes have been proposed for wireless sensor networks, it provides better security compared with traditional aggregation. In this paper, we try to focus on giving a brief statement of the various approaches used for the purpose of secure data aggregation in wireless sensor networks.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNSIJCNC
Wireless sensor networks (WSNs) consists of small nodes with constrain capabilities. It enables numerous
applications with distributed network infrastructure. With its nature and application scenario, security of
WSN had drawn a great attention. In malicious environments for a functional WSN, security mechanisms
are essential. Malicious or internal attacker has gained attention as the most challenging attacks to
WSNs. Many works have been done to secure WSN from internal attacks but most of them relay on either
training data set or predefined thresholds. It is a great challenge to find or gain knowledge about the
Malicious. In this paper, we develop the algorithm in two stages. Initially, Abnormal Behaviour
Identification Mechanism (ABIM) which uses cosine similarity. Finally, Dempster-Shafer theory (DST)is
used. Which combine multiple evidences to identify the malicious or internal attacks in a WSN. In this
method we do not need any predefined threshold or tanning data set of the nodes.
Analysis of security threats in wireless sensor networkijwmn
Wireless Sensor Network(WSN) is an emerging technology and explored field of researchers worldwide
in the past few years, so does the need for effective security mechanisms. The sensing technology
combined with processing power and wireless communication makes it lucrative for being exploited in
abundance in future. The inclusion of wireless communication technology also incurs various types of
security threats due to unattended installation of sensor nodes as sensor networks may interact with
sensitive data and /or operate in hostile unattended environments. These security concerns be addressed
from the beginning of the system design. The intent of this paper is to investigate the security related
issues in wireless sensor networks. In this paper we have explored general security threats in wireless
sensor network with extensive study.
An intrusion detection mechanism for manets based on deep learning artificial...IJCNCJournal
Mobile Ad-hoc Network (MANET) is a distributed, decentralized network of wireless portable nodes connecting directly without any fixed communication base station or centralized administration. Nodes in MANET move continuously in random directions and follow an arbitrary manner, which presents numerous challenges to these networks and make them more susceptible to different security threats. Due to this decentralized nature of their overall architecture, combined with the limitation of hardware resources, those infrastructure-less networks are more susceptible to different security attacks such as black hole attack, network partition, node selfishness, and Denial of Service (DoS) attacks. This work aims to present, investigate, and design an intrusion detection predictive technique for Mobile Ad hoc networks using deep learning artificial neural networks (ANNs). A simulation-based evaluation and a deep ANNs modelling for detecting and isolating a Denial of Service (DoS) attack are presented to improve the overall security level of Mobile ad hoc networks.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
N010617783
1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 6, Ver. I (Nov - Dec .2015), PP 77-83
www.iosrjournals.org
DOI: 10.9790/2834-10617783 www.iosrjournals.org 77 | Page
An overview of contemporary security problems in wireless mesh
networks
M. Sudhakar1
, Vandana Khare2
Professor, Department of ECE, CMR College of Engineering & Technology, India1
Associate Professor, Department of ECE, CMR College of Engineering & Technology, India2
Abstract: Wireless mesh network (WMN) is a new wireless networking concept. Unlike traditional
wireless networks, Wireless Mesh Networks do not rely on any fixed communications. As an
alternative, hosts rely on each other to keep the network connected. Wireless Internet service
providers are choosing WMNs to offer Internet connectivity, as it allows a fast, simple and
inexpensive network use. One major challenge in design of these networks is their vulnerability to
security attacks. In this paper, principal contemporary security issues for wireless mesh networks
have been investigated. Identification of the threats a Wireless mesh network faces and the security
goals to be realized are described. The new challenges and opportunities posed by this new
networking environment are dealt with and explored approaches to secure its communication.
Key Words: WLAN, WMN, MANET, WPA, MAC Layer.
I. Introduction
Wireless communication is without a doubt a very desirable service as emphasized by the tremendous
growthin both cellular and Wireless Local Area Networks (WLANs) on the other hand, these 2 radically
different technologies address only a narrow range of connectivity wants, & there are numerous other
applications that can benefit from wireless connectivity. The cellular networks offer wide area exposure, but the
service is relatively expensive and offers low data rates: even the third generation of cellular networks (3G)
offers (at best) low data rates (_2Mbps) compared to WLANs (>50Mbps for IEEE 802.11a and 802.11g and
_100Mbps for proprietary solutions at the time of this writing). On the other hand, the WLANs have rather
limited coverage. In order to increase the coverage of Wireless Local Area Networks, a wired backbone
connecting multiple access points is required. Wireless mesh networks (WMNs) have the potential toeliminate
many of these disadvantages by offeringlow cost, wireless broadband Internet access both for fixed and mobile
users.
In its most general form a wireless mesh network (WMN) interconnects stationary and/or mobileclients
and optionally provides access to the Internet. The important characteristic of a wireless mesh network is that
the nodes at the core of the network are forwarding the data to and from the clients in a multi hop fashion, thus
forming a (mobile) ad hoc network (MANET). Beyond the multi hop constraint; there are no other restrictions
on the design of a wireless mesh network, resulting in considerable flexibility and versatility. This versatility
allowed many players to enter the mesh networking arena with different products and applications.
The wireless links used to connect the mobile clients can be of the same type as the intra-mesh wireless
links[2] or can be a completely different technology [1]. (They can also be missing altogether.) Many
implementations allow mobile nodes to connect to the WMN while in its range; their packets are forwarded in
the same multi hop manner as the ones of the stationary nodes (and in their turn, although not always preferable,
the mobile nodes can forward packets on behalf of other nodes). Not all nodes have to support client nodes; the
service provider can employ several relay nodes to increase the coverage of the network (or to improve its
performance, as the relays can allow some clients to reach their destinations in fewer hops).
As WMNs become increasingly popular wireless networking technology for establishing the last-mile
connectivity for home networking, neighbourhood networking and community, it is imperative to design
efficient and secure communication protocols for these networks. On the other hand, the broadcast nature of
transmissions in the wireless medium and the dependency on the intermediate nodes for multi-hop
communications in such networks lead to several security susceptibilities. These security loopholes can be
exploited by potential external and internal attackers causing a detrimental effect on the network performance
and disturbance of services. The outer attacks are launched by unauthorized users who intrude into the network
for eavesdropping on the network packets and replay those packets at a later point of time to gain access to the
network resources [3]. On the contrary, the internal attacks are strategized by some legitimate members in the
network processing the authenticated credentials for accessing the network services. Identifying and defending
2. An overview of contemporary security problems in wireless mesh networks
DOI: 10.9790/2834-10617783 www.iosrjournals.org 78 | Page
against these attacks in Wireless Mesh Networks, it is a critical requirement in order to provide sustained
network services satisfying the quality of services of the user applications [4].
The chapter is planned as follows, Section II to VII presents various possible attacks on different layers
on the communication protocol stack of the WMNs. Section VIII discusses briefly on protection mechanism of
threats on various layers. Section IX highlights some future research trends on security and privacy issues in
WMNs.
II. Security Susceptibilities in WMNs
Different protocols for various layers of WMN communication stack have several susceptibilities.
These susceptibilities can be exploited by potential attackers to degrade or disrupt the networkservices. Since
many of the protocols assume a pre-existing cooperative relation among the nodes, for successful working of
these protocols, the contributing nodes need to be honest and well-behaving with no malicious or dishonest
purposes. In practice, some nodes may behave in amalicious or selfish manner or may be compromised by some
other malicious users. The assumption of pre existing trust relationships among the nodes and the absence of a
central administrator make the protocols at the link, network and transport layers vulnerable to various types of
attacks.
Furthermore, the application layer protocols can be attacked by worms, viruses, malwares etc.
Variouspossible attacks may also be launched on the protocols used for authentication, key management, and
user privacy security. In this section we present a comprehensive discussion on various types of attacks in
different layers of WMN protocol stack.
III. Security susceptibilities in the physical layer
The physical layer is responsible for carrier frequency generation, frequency selection, and modulation,
signal, detection, and data encryption. As with any radio based medium and the possibility of a jamming attack
in WMNs is high since this attack can be launched without much effort and sophistication. Jamming is a type of
attack which interferes with the radio frequencies that the nodesuse in a WMN for communication [5]. A
jamming source may be powerful enough to disrupt communication in the complete network. Still with less
powerful jamming sources, an adversary canpotentially disrupt communication in the entire network by
strategically distributing the jamming sources. An intermittent jamming source may also prove detrimental as
some communications in WMNs may be time sensitive. Congestion attacks can be more complex to detect if the
attackingdevices do not obey the MAC layer protocols [6].
IV. Security susceptibilities in the link layer
Different types of attacks square measure attainable within the link layer of a Wireless Mesh Networks.
A number of the key attacks at this layer are: passive eavesdropping, waterproof address spoofing, congestion,
unfairness in allocation, replay, partial matching and pre computation etc. These attacks square measure
concisely delineated during this sub section.
A. Passive eavesdropping: the printed nature of transmission of the wireless networks makes these networks at
risk of passive eavesdropping by the external attackers inside the transmission vary of the conversing nodes.
Multi-hop wireless networks like Wireless Mesh Networks are at risk of internal eavesdropping by the midway
hops, anyplace in a very malicious intermediate node might keep the copy of all the information that it forwards
while not the data of the other nodes within the network. Though a passive eaves dropping doesn’t have an
effect on the network, practicality directly, it ends up in the compromise in knowledge confidentiality and
knowledge integrity. Cryptography is usually used with victimisation sturdy encryption keys to guard the
confidentiality and integrity of knowledge.
B. Link layer ECM attack: link layers attacks square measure additional complicated compared to blind
physical layer jamming attacks. Instead of transmission random bits perpetually, the offender might transmit
regular waterproof frame headers (with no payload) on the channel that conforms to the MAC protocol being
employed within the victim network [7]. Consequently, the legitimate nodes continually notice the channel busy
and back down for a random amount of your time before sensing the channel once more. This ends up in the
denial-of-service for the legitimate nodes and additionally allows the ECM node to conserve its energy.
Intelligent ECM isn't a strictly transmit activity. Refined sensors square measure deployed, that observe and
establish victim network activity, with a selected specialise in the linguistics of higher-layer protocols (e.g.,
AODV and TCP). Supported by the observations of the sensors, the attackers will exploit the sure temporal
order behaviour exhibited by higher-layer protocols and use offline analysis of packet sequences to maximise
the potential gain for the transmitter. These attacks are often effective although cryptography techniques like
wired equivalent privacy (WEP) and local area network protocol access (WPA) are used. As a result of the
3. An overview of contemporary security problems in wireless mesh networks
DOI: 10.9790/2834-10617783 www.iosrjournals.org 79 | Page
sensing element that assists the transmitter can still monitor the packet size, timing, and sequence to guide the
transmitter. As a result of these attacks square measure supported fastidiously exploiting protocol patterns and
consistencies across size, temporal order and sequence, preventing them would force modifications to the
protocol linguistics so these consistencies square measure removed where attainable.
C. Intentional collision of frames: a collision happens once 2 nodes conceive to transmit on constant frequency
at the same time [9]. Once frames collide, they're discarded and wish to be retransmitted. A mortal might
strategically cause collisions in specific packets such as acknowledgment (ACK) management messages. An
attainable results of such collision is that the pricey exponential back-off. The mortal might merely violate the
communication protocol and unceasingly transmit messages in an effort to get collisions. Recurrent collisions
also can be employed by AN offender to cause resource exhaustion. As an example, a naïve water proof layer
implementation might unceasingly conceive to channel the corrupted packets. Unless these retransmissions
square measure detected early, the energy levels of the nodes would be exhausted quickly. An offender might
cause unfairness by intermittently victimisation the waterproof layer attacks. During this case, the mortal
cause’s degradation of period applications running on different nodes by intermittently disrupts their frame
transmissions.
D. Water proof spoofing attack: waterproof addresses have long been used because the singularly distinctive
layer-2 network identifiers in each wired and wireless LANs. Waterproof addresses that square measure globally
distinctive have typically been used as an authentication issue or as a singular symbol for granting variable
levels of network privileges to a user. This can be notably common in 802.11 local area network networks.
However, the waterproof protocol in 802.11 customary and also the network interface cards don't offer any
safeguards against a possible offender from modifying the supply waterproof address in its transmitted frames.
Modifying the waterproof addresses in transmitted frames is referred to as waterproof spoofing, and it is often
employed by attackers in a different ways. Waterproof spoofing allows the offender to evade intrusion detection
systems (IDSs) within the networks. Further, the network administrators typically use waterproof addresses in
access management lists.
E. Replay attack: the replay attack typically referred to as the man-in-the-middle attack [10], can be launched
by external moreover as internal nodes. As an example, an external malicious node (M) can listen in on the
printed communication between 2 nodes A and B. It will then replay the (eaves dropped) messages later to
realize access to the network resources. Generally, the authentication information is replayed wherever the
offender M deceives a node (node B) to believe that the attacker could be a legitimate node (node). On an
identical note, the malicious node M, that is an intermediate hop between 2 nodes A and B, will keep a duplicate
of all relayed knowledge. It will then retransmit this knowledge later to realize an unauthorized access to the
network resources.
F. Pre-computation and partial matching attack: in contrast to the preceding attacks, where MAC protocol
vulnerabilities square measure exploited, these attacks exploit the vulnerabilities within the security mechanisms
that square measure used to secure the water proof layer of the network. Pre-computation and partial matching
attacks exploit the crypto logic primitives that square measure used at the waterproof layer for secure
communication. In a very pre-computation attack or time memory trade-off attack (TMTO), the attacker
computes an oversized quantity of data (key, plaintext, and individual cipher text) and stores that information
before launching the attack. Once the particular transmission starts, the offender uses the pre computed
information to hurry up the cryptography method. TMTO attacks square measure extremely effective against an
oversized range of crypto logic solutions. On the opposite hand, in a very partial matching attack, the attacker
has access to some (cipher text, plaintext) pairs, that successively decreases the cryptography key strength, and
improves the possibilities of success of the brute force mechanisms. Partial matching attacks exploit the weak
implementations of cryptography algorithms. as an example, within the IEEE 802.11 standard for waterproof
layer security in wireless networks, the waterproof address fields within the waterproof header square measure
used in the message integrity code (MIC). The waterproof header is transmitted as plaintext whereas the MIC
field is transmitted within the encrypted type. Partial data of the plaintext (MAC address) and also the cipher
text (MIC) makes IEEE 802.11i at risk of partial matching attacks. DoS attacks can also be launched by
exploiting the protection mechanisms.
V. Security susceptibilities in the network layer
The attacks on the network layer are loosely divided into 2 types: management packets attacks and
knowledge packets attacks. What is more, each of these attacks can be either active or passive in nature [11].
Management packets attacks usually target the routing practicality of the network layer. The target of the
4. An overview of contemporary security problems in wireless mesh networks
DOI: 10.9790/2834-10617783 www.iosrjournals.org 80 | Page
assaulter is to create routes untouchable or force the network to decide on sub-optimal routes. On the opposite
hand, the information packet attacks have an effect on the packet forwarding practicality of the network. The
target of the assaulter is to cause the denial of service for the legitimate user by creating user knowledge
undeliverable or injecting malicious knowledge into the network. We tend to first think about the network layer
management packets attacks.
A. Attacks on the management packets: dashing attacks that focus on the on-demand routing protocols (e.g.,
AODV), were among the primary exposed attacks known by Hu et al. [12] on the network layer of multi-hop
wireless networks. Dashing attacks exploit the route discovery mechanism of on-demand routing protocols. In
these protocols, the node requiring a route to the destination floods the route request (RREQ) message that is
known by a sequence range. To limit the flooding, every node solely forwards the primary message that it
receives and drops remaining messages with an equivalent sequence range. The protocol specify a particular
quantity of delay between receiving the RREQ message by a specific node and forwarding it, to avoid collusion
of those messages. The malicious node launching the dashing attack forwards the RREQ message to the target
node before the other intermediate node from the supply to destination. This could simply be achieved by
ignoring the required delay.
A black hole attack (or depression attack) [13] is another attack that ends up in denial of service in
WMNs. It conjointly exploits the route discovery mechanism of on-demand routing protocols. In an exceedingly
black hole attack, the malicious node forever replies completely to a RREQ, though it should not have a sound
route to the destination. As a result, the malicious node doesn't check its routing entries; it'll forever be the
primary to reply to the RREQ message. Therefore, most the traffic inside the neighbourhood of the malicious
node is going to be directed towards the malicious node, which can drop all the packets, inflicting a denial of
service
A gray hole attack could be a variant of the black hole attack. In an exceedingly black hole attack, the
malicious node drops all the traffic that it's imagined to forward. This might result in doable detection of the
malicious node. In a gray hole attack, the someone avoids the detection by dropping the packets by selection. A
gray hole doesn't result in complete denial of service; however it should go undetected for an extended length of
time.
A Sybil attack is that the type of attack wherever a malicious node creates multiple identities within the
network, every showing as a legitimate node [14]. A Sybil attack was first exposed in distributed computing
applications wherever the redundancy within the system was exploited by making multiple identities and
dominant the goodish system resources. Within the networking state of affairs, variety of services like packet
forwarding, routing, and cooperative security mechanisms is discontinuous by someone employing a Sybil
attack.
In addition to the above-named attacks, the network layer of WMNs also are liable to various types of
attacks such as: route request (RREQ) flooding attack, route reply (RREP) loop attack, route re-direction attack,
false route fabrication attack, network partitioning attack, etc.,
B. Attacks on the information packets: the attacks on the information packets square measure primarily
launched by selfish and malicious (i.e., compromised) nodes within the network and result in performance
degradation or denial of service of the legitimate user knowledge traffic. The best of the information plane
attacks is passive eavesdropping. Eavesdropping could be a raincoat layer attack. Narcissistic behaviour of the
participating WMN nodes could be a major security issue as a result of the WMN nodes square measure
obsessed on each other for knowledge forwarding. The intermediate-hop narcissistic nodes might not perform
the packet-forwarding functionality as per the protocol. The narcissistic node could drop all the information
packets, leading to completed of service, or it should drop the information packets by selection or
indiscriminately. It's arduous to distinguish between such a narcissistic behaviour and therefore the link failure
or network congestion. On the opposite hand, malicious intermediate-hop nodes could inject junk packets into
the network. Goodish network resources (i.e., information measure and packet process time) could also be
consumed to forward the junk packets, which may result in denial of service for legitimate user traffic.
C. Attacks on multicast routing protocols: multicast routing protocols deliver knowledge from a supply node to
multiple destinations that square measure organized in an exceedingly multicast cluster. Since several of the
applications that use multicast services in an exceedingly WMN have high-throughput needs, and hop-count will
not serve as a decent metric for increasing output, some protocols [15,16] concentrate on increasing path
throughput, wherever ways square measure chosen supported metrics that square measure obsessed on the
wireless link qualities. In these protocols, nodes sporadically send probes to their neighbours to live the quality
of the links from their neighbours. Choice of the most effective path for increasing output is finished based on
collaboration of nodes. Associate in nursing aggressive strategy for the most effective path choice presumptuous
5. An overview of contemporary security problems in wireless mesh networks
DOI: 10.9790/2834-10617783 www.iosrjournals.org 81 | Page
a perfect collaboration among all taking part nodes provides a straightforward chance to a malicious node to
manipulate the link metrics to its own advantage. In different words, Associate in nursing assaulter could fitly
regulate the link metrics so it gets chosen on the most effective routing path for a source-destination combine.
During this method, it draws additional traffic towards itself. However, since its intention is to disrupt network
communication, it starts dropping packets will which which may might} result in a doable network partitioning
or can facilitate the malicious node to hold out a traffic analysis on the network.
VI. Security vulnerabilities in the transport layer
The attacks that can be launched on the transport layer of a WMN are SYN flooding attack and De-
synchronization attack.
A. SYN flooding attacks are simple to launch on a transport layer protocol like transmission control
protocol. Transmission control protocol needs state in formation to be maintained at each ends of an affiliation
between 2 nodes, that makes the protocol at risk of memory exhaustion through flooding. Associate in nursing
assaulter could repeatedly build new connection request till the resources needed by every affiliation are
exhausted or reach a maximum limit. In either case, more legitimate requests are going to be neglected. One
variant of such DoS attacks is the SYN flooding attack, during which Associate in Nursing assaulter creates an
oversized variety of half-open transmission control protocol connections with a target node while not finishing
any of those requests. Within the transmission control protocol, 2 nodes have to successfully complete a three-
party shake mechanism before sessions are often established between the nodes. Within the first message, the
node initiating the communication sends a SYN packet to the receiver node in conjunction with a sequence
variety. The receiver node sends a SYN/ACK message containing a sequence variety Associate in nursing an
acknowledgment sequence variety to the initiator node. The instigator node then completes the shake method by
causing Associate in nursing ACK message containing Associate in nursing acknowledgment variety. Associate
in nursing assaulter will exploit this protocol by causing a large number of SYN packets to a target node and
spoofing the destination of the SYN packets.
Session hijacking attacks exploits the vulnerability of the transport protocols (e.g., TCP) that do not
provide AN security check throughout an on-going session. All security mechanisms square measure applied
only during the session institution time. in an exceedingly protocol session hijacking attack, AN wrongdoer
spoofs the IP address of a victim node, properly determines the present sequence range that's expected to be
generated at the victim node, then performs a DoS attack on the victim node.
B. De-synchronization attack refers to the disruption of associate existing affiliation [9]. Associate offender
might for instance, repeatedly spoof messages to associate finish host inflicting the host to request the
retransmission of incomprehensible frames. If regular properly, associate offender might degrade or perhaps
stop the power of the end hosts to with success exchange knowledge inflicting them instead to waste energy
making an attempt to recover from errors that ne'er extremely exist.
In this attack, associate offender injects false knowledge in associate current session between 2 nodes by
launching a session hijacking attack. The false injected knowledge is received by one of the nodes within the
human action try and on receipt of the information; the node sends associate ACK to the other node. Since the
node at the opposite finish wasn't expecting the sequence range of this ACK packet, the node tries to re-
synchronize the session with its human action peer. This cycle goes on indefinitely as the ACK packets
travelling back associated forth within the network causes an ACK storm.
VII. Security vulnerabilities in the application layer
At the appliance layer, a compromise needs a full information of the human activity applications (e.g.,
application layer info for traffic snooping) furthermore as compromising all the lower layers. The impact of such
attacks will be extraordinarily prejudicial. As an example, a flooding attack will have an effect on the
availability of the victim node furthermore as an oversized portion of the network. Snooping attack at the
application layer will have an effect on the integrity of the messages being communicated.
The attacks in the application layer are principally as a result of the viruses, malwares and worms or the
repudiation attacks launched by business executive nodes [17]. Mobile viruses and worms contain malicious
codes that unfold or replicate apace in a very network and in the hosts and launch varied styles of attacks like
memory exhaustion, data escape, phishing etc.
Repudiation attacks launched within the application layer cannot be detected or prevented by deploying
firewalls at the network layer or by end-to-end cryptography of traffic at the transport layer. Associate degree
attacker getting associate degree access to the data in network or host by refined techniques will repudiate
6. An overview of contemporary security problems in wireless mesh networks
DOI: 10.9790/2834-10617783 www.iosrjournals.org 82 | Page
having conducting such an activity. Detection of such attacks desires refined intrusion detection systems at
multiple layers.
VIII. Security vulnerabilities and the user privacy protection mechanisms
Protection of user privacy is a very important issue in wireless network communication. However,
ensuring privacy of the users is tough to realize although the messages within the network are protected, as there
are not many security solutions or mechanisms which may guarantee that knowledge isn't discovered by the
authorized parties themselves [18]. Communication privacy can't be assured with message encryption since the
attackers will still observe UN agency is human activity with whom likewise as the frequency and period of
every communication session. Additionally, unauthorized parties will get access to the situation info regarding
the positions of various MCs by observant their communication and traffic patterns. Hence, there's a desire to
make sure location privacy in WMNs likewise.
Table 1 presents a summary of various types of vulnerabilities in different layers of the communication protocol
stack of a WMN and their possible defence mechanisms. The details of the different defence mechanisms are
just mentioned.
TABLE 1
Various Types Of Vulnarabilites And Their Defence Mechanisms
Layer Attacks Defence Mechanisms
Physical Jamming Spread-spectrum, priority messages, lower duty cycle, region mapping,
mode change
MAC Collision Error-correction code
Exhaustion Rate limitation
Unfairness Small frames
Network Spoofed routing information &
selective forwarding
Egress filtering, authentication, monitoring
Sinkhole Redundancy checking
Sybil Authentication, monitoring, redundancy
Wormhole Authentication, probing
Hello Flood Authentication, packet leashes by using geographic and temporal
information
Ack. Flooding Authentication, bi-directional link
authentication verification
Transport SYN Flooding
De-synchronization
Client puzzles, SSL-TLS authentication, EAP
Application Logic errors Buffer overflow Application authentication Trusted computing, Antivirus
Privacy Traffic analysis, Attack on
data privacy and location
privacy
Holomorphic encryption, Onion routing, schemes based on traffic
entropy computation, group signature
based anonymity schemes, use of pseudonyms
IX. Conclusion
WMNs became the main focus of analysis in wireless networks within the recent years because of their
great promise in realizing varied next-generation wireless services. Driven by the demand for made and high-
speed content access, recent analysis on WMNs has targeted on developing high performance communication
protocols. Whereas, the protection and privacy problems with these protocols have received comparatively less
attention. However, given the wireless and multi-hop nature of communication in WMNs, these networks
square measure susceptible to a larger form of attacks the least bit layers of the communication protocol stack.
Although, the researchers have created substantial contributions within the areas of security and privacy in
WMNs, there square measure still several challenges that stay to be addressed.
Driven by the increasing demand for made, high-speed and information measure intensive content
access, recent analysis has targeted on developing high performance communication protocols for such
networks, whereas problems like security, privacy, access management, intrusion detection, secure
authentication etc. have taken the rear seat. However, given the inherent vulnerabilities of the wireless medium
as a result of its broadcast nature and multi-hop communications in WMNs, these networks square measure
subject to a large vary of threats.
This paper has facilitated a comprehensive presentation on the assorted attacks on totally different
layers of the communication protocol stack of WMNs. While highlight varied vulnerabilities within the
physical, link, network, transport and application layers, this paper simply mentioned its attention on however
attacks are often launched on authentication, privacy and key management protocols on WMNs. In respect of
distinctive varied security threats, the paper has varied defence mechanisms for defending those attacks. Future
work is going to be carried out on comprehensive survey of a number of these defence mechanisms and
7. An overview of contemporary security problems in wireless mesh networks
DOI: 10.9790/2834-10617783 www.iosrjournals.org 83 | Page
conjointly comparison of them with relation to their different approaches towards security and their
performance efficiencies.
References
[1] “Firetide website.” http://www.firetide.com.
[2] “MeshNetworks website.” http://www.meshnetworks.com.
[3] J. Sen, “Secure and privacy-preserving authentication protocols for wireless mesh networks”, bookchapter in: Applied
Cryptography and Network Security, J. Sen (ed.), pp. 3 - 34, INTECH, Croatia,2012.
[4] J. Sen, “Secure routing in wireless mesh networks”, book chapter in: Wireless Mesh Networks, N.Funabiki (ed.), pp. 237-280,
INTECH, Croatia, 2011.
[5] E. Shi and A. Perrig, “Designing secure sensor networks”, IEEE Wireless Communication Magazine,vol 11, no 6, pp. 38-43, 2004.
[6] W. Xu, W. Trappe, Y. Zhang, and T. Wood, “The feasibility of launching and detecting jammingattacks in wireless networks”, in
Proceedings of the 6th ACM International Symposium on Mobile AdHoc Networking and Computing (MobiHoc’05), Urbana-
Champaign, IL, USA, pp. 46-47, May 2005,ACM Press.
[7] Y. Law, M. Palaniswami, L. V. Hoesel, J. Doumen, P. Hartel, and P. Havinga, “Energy-efficient linklayer jamming attacks against
wireless sensor network MAC protocols”, in ACM Transactions onSensor Networks (TOSN), vol 5, no 1, article no 6, February
2009.
[8] T. X. Brown, J. E. James, and A. Sethi, “Jamming and sensing of encrypted wireless ad hoc networks”, in Proceedings of the 7th
ACM International Symposium on Mobile Ad Hoc Networking and Computing(MobiHoc’06), Florence, Italy, pp. 120-130, May
2006.
[9] A. D. Wood and J. A. Stankovic, “Denial of service in sensor networks”, IEEE Computer, vol 35, no10, pp. 54-62, 2002.
[10] A. Mishra and W. A. Arbaugh, “An initial security analysis of the IEEE 802.1X standard”, Technical Report CS-TR-4328,
Computer Science Department, University of Maryland, USA, 2002.
[11] A. Naveed, S. S. Kanhere, and S. K. Jha, “Attacks and security mechanisms”, book chapter in: Securityin Wireless Mesh Networks,
Y. Zhang et al. (eds.), pp. 111-144, Auerbach Publications, CRC Press,USA, 2008.
[12] Y.-C. Hu, A. Perrig, and D. B. Johnson, “Rushing attacks and defense in wireless ad hoc networkrouting protocols”, in Proceedings
of the ACM Workshop on Wireless Security (WiSe’03) inconjunction with ACM MobiCom’03, San Diego, CL, USA, pp. 30-40,
September 2003, ACM Press.
[13] M. Al-Shurman, S-M. Yoo, and S. Park, “Black hole attack in mobile ad hoc networks”, in Proceedings of the 42nd Annual
Southeast Regional Conference(ACM-SE), Huntsville, Alabama, USA,pp. 96-97, April 2004.
[14] J. Newsome, E. Shi, D. Song, and A. Perrig, “The Sybil attack in sensor networks: analysis and defenses”, in Proceedings of the 3rd
International Symposium on Information Processing in SensorNetworks (IPSN’04), Berkeley, CA, USA, pp. 259 – 268, April 2004,
ACM Press.
[15] S. Roy, D. Koutsonikolas, S. Das, and C. Hu, “High-throughput multicast routing metrics in wireless mesh networks”, in
Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS’06), Lisbon, Portugal, p. 48,
July 2006. IEEE Computer Society Press.
[16] A. Chen, D. Lee. G. Chandrasekaran, and P. Sinha, “HIMAC: high throughput MAC layer multicasting in wireless networks”, in
Proceedings of the 3rd IEEE International Conference on Mobile Adhoc and Sensor Systems (MASS’06), Vancouver, British
Columbia, Canada, pp. 41-50, October 2006.
[17] B. Wu, J. Chen, J. Wu., and M. Cardei, “A survey on attacks and countermeasures in mobile ad hoc networks”, book chapter in:
Wireless Network Security, Y. Xiao et al. (eds.), pp. 103-135, Springer, Signals and Communications Technology, 2006.
[18] H. Moustafa, “Providing authentication, trust, and privacy in wireless mesh networks”, book chapter in: Security in Wireless Mesh
Networks. Y.Zhang et al. (eds.), pp. 261-295, CRC Press, USA, 2007.
[19] Y. Zhang, W. Liu, W. Lou, and Y. Fang, “MASK: anonymous on-demand routing in mobile ad hoc networks”, IEEE Transactions
on Wireless Communications, vol 5, no 9, pp. 2376–2385, September 2006.
[20] X. Lin, X. Ling, H. Zhu, P.-H. Ho, and X. S. Shen, “A novel localised authentication scheme in IEEE 802.11 based wireless mesh
networks”, International Journal of Security and Networks, vol 3, no 2, pp. 122-132, 2008
AUTHOR BIOGRAPHY
Dr. M. Sudhakar1
: Graduated from JNTU College of Engineering, Hyderabad in 1979, with
specialization in ECE. He completed his M.Tech from Indian Institute of Technology Madras
in 1986 with the specialization in Instrumentation, Control & Guidance. Obtained doctoral
degree from Annamalai University. Successfully headed R&D Project assigned by IAF on
“Mathematical Modelling & Simulation of Aero Engine Control System‟ at Aeronautical
Development Establishment, Bangalore and Gas Turbine Research Establishment, Bangalore.
He is presently working as a Professor in the department of ECE and Vice Principal at CMR
College of Engineering & Technology, Hyderabad.
Mrs. Vandana Khare2
is pursuing PhD in Communication Engineering JNTU Hyderabad
(A.P). She completed M.E (Digital techniques) in 1999 from SGSITS, INDORE (M.P) India
and B.E in ECE in the year 1994 from GEC Rewa (M.P). She is Associate Professor in ECE
at CMR College of Engineering & Technology. Secunderabad. She has 18 years of teaching
experience and has published 13 research papers in International journals &presented 5
papers in National & International conferences. She is life member of ISTE, IETE & IEEE
Technical societies. Her research Interest includes Wireless Communication, Computer
Networks, Mobile Computing and Bio-Medical Imaging.