CFP last date
20 May 2024
Reseach Article

Wireless Mesh Networks (WMN)

by Ritu Malik, Meenakshi Mittal, Isha Batra, Chander Kiran
journal cover thumbnail
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Number 23
Year of Publication: 2010
Authors: Ritu Malik, Meenakshi Mittal, Isha Batra, Chander Kiran
10.5120/533-697

Ritu Malik, Meenakshi Mittal, Isha Batra, Chander Kiran . Wireless Mesh Networks (WMN). International Journal of Computer Applications. 1, 23 ( February 2010), 66-74. DOI=10.5120/533-697

@article{ 10.5120/533-697,
author = { Ritu Malik, Meenakshi Mittal, Isha Batra, Chander Kiran },
title = { Wireless Mesh Networks (WMN) },
journal = { International Journal of Computer Applications },
issue_date = { February 2010 },
volume = { 1 },
number = { 23 },
month = { February },
year = { 2010 },
issn = { 0975-8887 },
pages = { 66-74 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume1/number23/533-697/ },
doi = { 10.5120/533-697 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:48:05.411932+05:30
%A Ritu Malik
%A Meenakshi Mittal
%A Isha Batra
%A Chander Kiran
%T Wireless Mesh Networks (WMN)
%J International Journal of Computer Applications
%@ 0975-8887
%V 1
%N 23
%P 66-74
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless Mesh Network (WMN) is one of emerging technology of the next generation networks, and it is going to address the internet provision to users at low cost anytime from anywhere. Being a broadband wireless network of the future, still it is facing a lot of technical and critical issues which are prohibiting it from the world wide deployment and acceptance. Multi-hop nature of this broadband wireless technology increases routing overhead and poor packet delivery ratio. In this paper, we present firstly the detailed architecture of IEEE 802.11 WMN, and then a new architecture for WMN is proposed, which consists two components, one is Mesh Backbone, the other is Mesh Domain. Then some security attacks on WMN and then a proposed architecture which will solve most of the existing and the future problems. The main concerns of this architecture is that its multi-hop nature and ad hoc connectivity amongst the nodes of WMN with current as well as future prospective.

References
  1. Tzu-Jane Tsai and Ju-Wei Chen, "IEEE 802.11 MAC Protocol over Wireless Mesh Networks: Problems and Perspectives" IEEE 19th International Conference, 2005.
  2. http://www.windowsecurity.com/articles/Wireless_Attacks_Primer.html
  3. Hesam Moharrer, "A survey on attacks and countermeasures in mobile Ad Hoc networks" WIRELESS/MOBILE NETWORK SECURITY, Springer 2006.
  4. Hongjian Li, Ming Xu, and Yi Li, "Selfish MAC layer Misbehavior detection model for the IEEE 802.11-based Wireless Mesh Networks" LNCS 4847, pp.382-391. Springer, Heidelberg 2007.
  5. Naouel Ben Salem, Jean-Pierre hubaux, "Securing Wireless Mesh Networks" IEEE Wireless communication Vol.13, April, 2006.
  6. L. Santhanam, D. Nandiraju, N. Nandiraju, and D. P. Agrawal, "Active cache based defence against DoS attacks in Wireless Mesh Network" IEEE Wireless Pervasive Computing, ISWPC. 2nd International Symposium 2007.
  7. V. Chavoutier, D. Maniezzo, C. E. Palazzi, M. Gerla, "Multimedia over wireless mesh networks: Results from a real testbed evaluation", 6th annual Mediterranean Ad hoc networking workshop, Greece, June, 2007.
  8. M. S. Siddiqui, C. S. Hong, "security issues in wireless mesh networks" IEEE International Conference on Multimedia and Ubiquitous Engineering(MUE'07) 2007.
  9. Hongmei Deng, Wei Li, and Dharma P. Agarwal, "Routing Security in Wireless Ad Hoc Networks" IEEE Communication Magazine, Volume 40, p 70-75, Oct 2002.
  10. L. Tamilselvan, Dr. V Sankaranarayanan, "Prevention of Blackhole attack in MANET" the second international AusWireless, 2007.
  11. Roger P. Karrer, Antonio Pescape, "2nd generation wireless mesh networks: technical, economical and social challenges".
  12. Fei Xing, Wenye Wang, "Understanding Dynamic Denial of Service Attack in Mobile Ad hoc Networks", IEEE Military communication conference, MILCOM 2006.
  13. B. Parno, A. Perrig, and V. Gligor, "Distributed Detection of Node Replication Attack in Sensor Networks", In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May, 2005.
  14. B. Kannhavong, H. Nakayama, N. Kato, Y. Nemoto, " Analysis of the node isolation Attack against OLSR-based Mobile Ad Hoc Networks", IEEE International symposium on computer networks, 2006.
  15. http://www.wings.cs.sunysb.edu/~ritesh/wormhole.html
  16. Qifeng Lu, "A Survey on Vulnerability of Wireless Routing Protocols" University of Massachusetts Amherst, 2002.
  17. T. R. Andel, A. Yasinsac, "The invisible node attack revisited" proceedings of IEEE SoutheastCon, 2007.
  18. http://www.oreillynet.com/pub/a/wireless/2004/01/22/wirelessmesh.html
  19. Muhammad S. Siddiqui and Choong Seon Hong, "Security Issues in Wireless Mesh Networks," IEEE International Conference on Multimedia and Ubiquitous Engineering (MUE'07), 2007
  20. Wireless mesh network, from Wikipedia, the free encyclopedia,http://en.wikipedia.org/wiki/Wireless_mesh_network (May 24, 2008)
  21. X. Gu and R. Hunt, "Wireless LAN Attacks and Vulnerabilities" In the Proceeding of IASTED Networks and Communication Systems, April 2005
Index Terms

Computer Science
Information Sciences

Keywords

Mesh Routers Mesh Gateways Mesh Clients Attacks