The Community for Technology Leaders
RSS Icon
Issue No.04 - July/August (2008 vol.12)
pp: 30-36
Steve Glass , Queensland Research Lab, NICTA
Marius Portmann , University of Queensland
Vallipuram Muthukkumarasamy , Queensland Research Lab, NICTA
Now found in domestic, commercial, industrial, military, and healthcare applications, wireless networks are becoming ubiquitous. Wireless mesh networks (WMNs) combine the robustness and performance of conventional infrastructure networks with the large service area and self-organizing and self-healing properties of mobile ad hoc networks. In this article, the authors consider the problem of ensuring security in WMNs, introduce the IEEE 802.11s draft standard, and discuss the open security threats faced at the network and data-link layers.
wireless mesh network, Security, network-level security, protection, mesh networking
Steve Glass, Marius Portmann, Vallipuram Muthukkumarasamy, "Securing Wireless Mesh Networks", IEEE Internet Computing, vol.12, no. 4, pp. 30-36, July/August 2008, doi:10.1109/MIC.2008.85
1. I.F. Akyildiz, X. Wang, and W. Wang, "Wireless Mesh Networks: A Survey," Computer Networks and ISDN Systems, vol. 47, no. 4, 2005, pp. 445–487.
2. G.R. Hiertz et al., "Principles of IEEE 802.11s," Proc. 16th Int'l Conf. Computer Comm. and Networks (ICCCN 07), IEEE CS Press, 2007, pp. 1002–1007.
3. X. Zheng et al., "A Dual Authentication Protocol for IEEE 802.11 Wireless LANs," Proc. 2nd Int'l Symp. Wireless Comm. Systems, IEEE CS Press, 2005, pp. 565–569.
4. D. Harkins and C. Kuhtz, Secure Mesh Formation, tech. report 802.11-06/1092r2, IEEE, 2006.
5. N.B. Salem and J.-P. Hubaux, "Securing Wireless Mesh Networks," Wireless Comm., vol. 13, no. 2, 2006, pp. 50–55.
6. Q. Lu, Vulnerability of Wireless Routing Protocols, tech. report, Univ. of Massachusetts, Amherst, Dec. 2002; Vulnerability_Qifeng%20Lu.pdf.
7. C.E. Perkins and E.M. Royer, "Ad-Hoc On-Demand Distance Vector Routing," Proc. 2nd IEEE Workshop on Mobile Computer Systems and Applications (WMCSA 99), IEEE CS Press, 1999, pp. 90–100.
8. M. Bahr, "Proposed Routing for IEEE 802.11s WLAN Mesh Networks," Proc. 2nd Ann. Int'l Workshop Wireless Internet (WICON 06), ACM Press, 2006, p. 5.
9. Y.-C. Hu and A. Perrig, "A Survey of Secure Wireless Ad Hoc Routing," IEEE Security &Privacy, vol. 2, no. 3, 2004, pp. 28–39.
10. K. Sanzgiri et al., "A Secure Routing Protocol for Ad Hoc Networks," Proc. 10th IEEE Int'l Conf. Network Protocols, IEEE CS Press, 2002, pp. 78–89.
11. Y.-C. Hu, D.B. Johnson, and A. Perrig, "SEAD: Secure Efficient Distance Vector Routing in Mobile Wireless Ad Hoc Networks," Proc. 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 02), June 2002, pp. 3–13.
12. Y.-C. Hu, A. Perrig, and D.B. Johnson, "Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols," Proc. 2003 ACM Workshop on Wireless Security, ACM Press, 2003, pp. 30–40.
13. S. Apkun, L. Buttyán, and J.-P. Hubaux, "SECTOR: Secure Tracking of Node Encounters in Multihop Wireless Networks," Proc. 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, ACM Press, 2003, pp. 21–32.
14. Y.-C. Hu, A. Perrig, and D.B. Johnson, "Wormhole Attacks in Wireless Networks," IEEE J. Selected Areas in Comm., vol. 24, no. 2, Feb. 2006, pp. 370–380.
15. T. Korkmaz, "Verifying Physical Presence of Neighbors Against Replay-Based Attacks in Wireless Ad Hoc Networks," Proc. Int'l Conf. Information Technology: Coding and Computing (ITCC 05), IEEE CS Press, vol. 2, 2005, pp. 704–709.
16. J. Eriksson, S.V. Krishnamurthy, and M. Faloutsos, "Truelink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks, Proc. 14th Ann. IEEE Conf. Network Protocols (ICNP 06), IEEE CS Press, 2006, pp. 75–84.
17. S. Marti et al., "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," Proc. 6th Ann. Int'l Conf. Mobile Computing and Networking (MobiCon 00), ACM Press, 2000, pp. 255–265.
18. D. Kuhlman et al., A Proof of Security of a Mesh Security Architecture, tech. report 802.11-07/2436r0, IEEE Press, 2007; 0711-07-2436-00-000s-a-proof-of-security-of-a-mesh-security-architecture.doc .
19. A. Chou et al., "An Empirical Study of Operating System Errors," ACM Operating Systems Rev., vol. 35, 2001, pp. 73–88.
14 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool