Abstract
Infrastructure-based Wireless Mesh Networks are emerging as an affordable, robust, flexible and scalable technology. With the advent of Wireless Mesh Networks (WMNs) the dream of connecting multiple technology based networks seems to come true. A fully secure WMN is still a challenge for the researchers. In infrastructure-based WMNs almost all types of existing Wireless Networks like Wi-Fi, Cellular, WiMAX, and Sensor etc can be connected through Wireless Mesh Routers (WMRs). This situation can lead to a security problem. Some nodes can be part of the network with high processing power, large memory and least energy issues while others may belong to a network having low processing power, small memory and serious energy limitations. The later type of the nodes is very much vulnerable to targeted attacks. In our research we have suggested to set some rules on the WMR to mitigate these kinds of targeted flooding attacks. The WMR will then share those set of rules with other WMRs for Effective Utilization of Resources.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Akyildiz, I.F., Wang, X., Wang, W.: Wireless mesh networks: a survey Broad band and Wireless Networking, (BWN) Lab, School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta (January 1, 2005)
Dilmaghani, R.B., Rao, R.R.: Hybrid Wireless Mesh Network with Application to Emergency Scenarios. Journal of Software 3(2), 52–60 (2008)
Yan, W., Ren, M., Zhao, T., Li, X.: A Bandwidth Management Scheme Support for Real-time Applications in Wireless Mesh Networks. In: ACM symposium on Applied computing Computer networks, Fortaleza, Ceara, Brazil, pp. 2063–2068 (2008)
Akyidiz, I.F., Wang, X., Wang, W.: Wireless Mesh Network: a Survey. The International Journal of Computer and Telecommunications Networking 47(4), 445–487 (2004)
Mynampati, V., Kandula, D., Garimilla, R., Srinivas, K.: Performance and Security of Wireless Mesh Networks, Blekinge Institute of Technology (June 2009)
Kone, V., Das, S., Zhao, B.Y., Zheng, H.: QUORUM: quality of service in wireless mesh networks. Mobile Networks and Applications 12(5), 358–369 (2007)
Hugelshofer, F., Smith, P., Hutchison, D., Race, N.J.P.: OpenLIDS: A Light weight Intrusion Detection System for Wireless Mesh Networks. In: International Conference on Mobile Computing and Networking, Beijing, China (2009)
YeYan, JiannongCao, ZhuLi: Stochastic Security Performance of Active Cache Based Defense against DoS Attacks in Wireless Mesh Network. In: Second International Conference on Advances in Mesh Networks, Athens/Glyfada, Greece (2009)
XiaWang, Wong, J.S., Stanley, F., SamikBasu: Cross-layer Based Anomaly Detection in Wireless Mesh Networks. In: Ninth Annual International Symposium on Applications and the Internet, Washington, DC, USA (2009)
KuiRen, ShuchengYu, WenjingLou, YanchaoZhang: PEACE: Privacy-Enhancement Yet Accountable Security Framework. IEEE transactions on parallel and distributed systems 21(2), 1045–9219 (2010)
Bezahaf, M., LuigiIanonne: Practical DHT-Based Location Service for Wireless Mesh Networks. In: International Conference on Emerging Networking Experiments and Technologies, Rome, Italy, pp. 47–48 (2009)
Khan, Z.S., Sher, M., Rashid, K., Rahim, A.: A Three-Layer Secure Architecture for IP Multimedia Subsystem-Based Instant Messaging. Information Security Journal: A Global Perspective 18(3), 139–148 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gilani, S.S.A., Zubair, M., Khan, Z.S. (2010). Receiver Based Traffic Control Mechanism to Protect Low Capacity Network in Infrastructure Based Wireless Mesh Network. In: Bandyopadhyay, S.K., Adi, W., Kim, Th., Xiao, Y. (eds) Information Security and Assurance. ISA 2010. Communications in Computer and Information Science, vol 76. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13365-7_22
Download citation
DOI: https://doi.org/10.1007/978-3-642-13365-7_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13364-0
Online ISBN: 978-3-642-13365-7
eBook Packages: Computer ScienceComputer Science (R0)