Abstract
Infrastructure based Wireless mesh networks allow heterogeneous types of networks to be connected at a time through wireless mesh routers. Since the nodes of every network have different processing power, bandwidth, amount of energy etc. so this situation can lead to targeted attacks. An Internet connected node can easily generate flood over a node of sensor network. So to handle these types of attacks we in this paper introduced a new secure authentication mechanism that works when a potential of attack is detected. Moreover we also authorized the nodes of the wireless mesh network to demand data according to their capacity by using pull data traffic control mechanism. We applied this solution first on mesh routers to discourage targeted attacks and secondly we applied the solution on an individual node that lies in between a node and mesh router.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Akyildiz, I.F., Wang, X., Wang, W.: Wireless mesh networks: a survey Broad band and Wireless Networking, (BWN) Lab. School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta (January 1, 2005)
Dilmaghani, R.B., Rao, R.R.: Hybrid Wireless Mesh Network with Application to Emergency Scenarios. Journal of Software 3(2), 52–60 (2008)
Yan, W., Ren, M., Zhao, T., Li, X.: A Bandwidth Management Scheme Support for Real-time Applications in Wireless Mesh Networks. In: ACM symposium on Applied computing Computer networks, Fortaleza, Ceara, Brazil, pp. 2063–2068 (2008)
Akyidiz, I.F., Wang, X., Wang, W.: Wireless Mesh Network: a Survey. The International Journal of Computer and Telecommunications Networking 47(4), 445–487 (2004)
Mynampati, V., Kandula, D., Garimilla, R., Srinivas, K.: Performance and Security of Wireless Mesh Networks, Blekinge Institute of Technology (June 2009)
Kone, V., Das, S., Zhao, B.Y., Zheng, H.: QUORUM: quality of service in wireless mesh networks. Mobile Networks and Applications 12(5), 358–369 (2007)
Hugelshofer, F., Smith, P., Hutchison, D., Race, N.J.P.: OpenLIDS: A Light weight Intrusion Detection System for Wireless Mesh Networks. In: International Conference on Mobile Computing and Networking, Beijing, China (2009)
YeYan, JiannongCao, ZhuLi: Stochastic Security Performance of Active Cache Based Defense against DoS Attacks in Wireless Mesh Network. In: Second International Conference on Advances in Mesh Networks, Athens/Glyfada, Greece (2009)
XiaWang, Wong, J.S., Stanley, F., SamikBasu: Cross-layer Based Anomaly Detection in Wireless Mesh Networks. In: Ninth Annual International Symposium on Applications and the Internet, Washington, DC, USA (2009)
KuiRen, ShuchengYu, WenjingLou, YanchaoZhang: PEACE: Privacy-Enhancement Yet Accountable Security Framework. IEEE transactions on parallel and distributed systems 21(2), 1045–9219 (2010)
Bezahaf, M., Ianonne, L.: Practical DHT-Based Location Service for Wireless Mesh Networks. In: International Conference on Emerging Networking Experiments and Technologies, Rome, Italy, pp. 47–48 (2009)
Khan, Z.S., Sher, M., Rashid, K., Rahim, A.: A Three-Layer Secure Architecture for IP Multimedia Subsystem-Based Instant Messaging. Information Security Journal: A Global Perspective 18(3), 139–148 (2009)
Khan, Z.S., Rashid, K., Muhaya, F.B., Qutbuddin, Rahim, A.: Realization of call back authentication for web to cellular phone SMS communication. In: Computer and Mathematics with Application. Elsevier, Amsterdam (2009), doi:10.1016/j.camwa.2009.12.038
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Shafi, R., Rahim, A., bin Muhaya, F., Ashraf, S., Sher, M. (2010). Secure Mechanism for Handling Targeted Attacks in Infrastructure Based Wireless Mesh Networks. In: Bandyopadhyay, S.K., Adi, W., Kim, Th., Xiao, Y. (eds) Information Security and Assurance. ISA 2010. Communications in Computer and Information Science, vol 76. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13365-7_23
Download citation
DOI: https://doi.org/10.1007/978-3-642-13365-7_23
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13364-0
Online ISBN: 978-3-642-13365-7
eBook Packages: Computer ScienceComputer Science (R0)