Protection based on Neighborhood-Trust in Clustered Wireless Mesh Networks

被引:3
|
作者
Samad, Fahad [1 ]
Makram, Sadeq Ali [1 ]
机构
[1] Rhein Westfal TH Aachen, Dept Comp Sci, Chair Commun & Distributed Syst, Aachen, Germany
关键词
wireless mesh networks; security and privacy; clustering; neighborhood trust; hash chains;
D O I
10.1109/NGMAST.2009.26
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Mesh Network (WMN) is unquestionably an interesting technology addition in wireless communication networks because of its self-organizing, self-healing and reliability dimensions. However, possible misuse or hijacking of these networks by adversaries make them highly vulnerable. In this paper, we provide a protection mechanism based on neighborhood trust to gain required security and identification privacy in a clustered WMN. Our approach renders a lightweight protection against security vulnerabilities using hash chains and does not require any trusted authority.
引用
收藏
页码:487 / 493
页数:7
相关论文
共 50 条
  • [11] Community building over neighborhood Wireless Mesh Networks
    Antoniadis, Panayotis
    le Grand, Benedicte
    Satsiou, Anna
    Tassiulas, Leandros
    Aguiar, Rui L.
    Barraca, Joao Paulo
    Sargento, Susana
    IEEE TECHNOLOGY AND SOCIETY MAGAZINE, 2008, 27 (01) : 48 - 56
  • [12] Resource Allocation of Limited Feedback in Clustered Wireless Mesh Networks
    Lei Xu
    Yuwang Yang
    Yaping Li
    Wireless Personal Communications, 2014, 75 : 901 - 913
  • [13] Resource Allocation of Limited Feedback in Clustered Wireless Mesh Networks
    Xu, Lei
    Yang, Yuwang
    Li, Yaping
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 75 (02) : 901 - 913
  • [14] QoS Protection in Cognitive Wireless Mesh Networks
    Luong, Dinh-Dung
    Gregoire, Jean-Charles
    Dziong, Zbigniew
    ICNS: 2009 FIFTH INTERNATIONAL CONFERENCE ON NETWORKING AND SERVICES, 2009, : 342 - +
  • [15] A Dynamic Trust Updating Model Based on Multiple Constraints in Wireless Mesh Networks
    Peng, Sancheng
    Yang, Aimin
    Zhong, Hui
    Feng, Ziyuan
    2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (ICIST), 2013, : 815 - 819
  • [16] An Authenticated Trust Based Security Mechanism for Video Transmission in Wireless Mesh Networks
    Loret, J. B. Shajilin
    Kumar, T. Ganesh
    JOURNAL OF INTERNET TECHNOLOGY, 2021, 22 (04): : 757 - 764
  • [18] A Scalable Neighborhood Discovery Protocol for Infrastructure Wireless Mesh Networks
    Elias, Gledson
    Novaes, Mateus
    Cavalcanti, Gustavo
    Porto, Daniel
    MESH: 2009 SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN MESH NETWORKS, 2009, : 132 - 137
  • [19] Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS)
    Alsaedi, Noor
    Hashim, Fazirulhisyam
    Sali, A.
    Rokhani, Fakhrul Z.
    COMPUTER COMMUNICATIONS, 2017, 110 : 75 - 82
  • [20] Secure anonymous routing in trust and clustered wireless ad hoc networks
    Chen, Sisheng
    Xu, Li
    Chen, Zhide
    2007 SECOND INTERNATIONAL CONFERENCE IN COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1 AND 2, 2007, : 488 - 492