Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Security of Wireless Mesh Network from Denial of Service Attack

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Authors:
Sunita Rani, Shweta Nijhawan
10.5120/ijca2017915182

Sunita Rani and Shweta Nijhawan. Security of Wireless Mesh Network from Denial of Service Attack. International Journal of Computer Applications 172(7):25-29, August 2017. BibTeX

@article{10.5120/ijca2017915182,
	author = {Sunita Rani and Shweta Nijhawan},
	title = {Security of Wireless Mesh Network from Denial of Service Attack},
	journal = {International Journal of Computer Applications},
	issue_date = {August 2017},
	volume = {172},
	number = {7},
	month = {Aug},
	year = {2017},
	issn = {0975-8887},
	pages = {25-29},
	numpages = {5},
	url = {http://www.ijcaonline.org/archives/volume172/number7/28264-2017915182},
	doi = {10.5120/ijca2017915182},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

A wireless mesh network is correspondences arrange comprised of radio hubs sorted out in a mesh topology. It is additionally a type of wireless ad hoc network. It is also a form of wireless ad hoc network. Wireless mesh networks often consist of mesh clients, mesh routers & gateways. In this, discussed security issues related to Wireless Network. Then, study of Existing Security loop holes within wireless mesh based distributed network environment. Objective of research is to develop system to make Wireless mesh network secure form denial of service attack.

References

  1. Anil Kumar Gankotiya , Sahil Seth , Gurdit Singh , “Performance Analysis of Secure Wireless Mesh Networks” , Research Journal of Recent Sciences Vol. 1(3), 80-85, March 2012 .
  2. Monika, “Denial of Service Attacks in Wireless Mesh Networks”, International Journal of Computer Science and Information Technologies, Vol. 3 (3), 4516-4522, 2012.
  3. Priya Maidamwar & Nekita Chavhan, “security issues to detect wormhole attack in wireless sensor network”, International Journal on AdHoc Networking Systems (IJANS) Vol. 29(4), 37-50, October 2012.
  4. Pooja Sharma, “performance analysis of secure wireless mesh networks” International Journal of Research in Science & Technology (IJRST) 2013, Vol. 3(4), 65-75, 2013.
  5. Khaled M.Elleithy, Drazen Blagovic, Wang K. Cheng, Paul Sideleau, “Denial of Service Attack Techniques: Analysis, Implementation & Comparison”, Journal of Systemics, Cybernetics, & Informatics 3.1, 66-71, 2005.
  6. Manjula K G, M N Ravikumar, “Color Image Encryption & Decryption Using DES Algorithm”, International Research Journal of Engineering & Technology, Vol. 03(07), 1715-1718, 2016.
  7. Madhumita Panda, “Data Security in Wireless Sensor Networks via AES Algorithm” IEEE Sponsored 9th International Conference on Intelligent Systems & Control, 2015.
  8. Yanchao Zhang & Yuguang Fang, “ARSA: An Attack-Resilient Security Architecture for Multihop Wireless Mesh Networks”,IEEE journal on selected areas in communications, vol. 24(10), 1916-1928, 2006.
  9. Ian F. Akyildiz, Xudong Wang, Weilin Wang “Wireless mesh networks: a survey”, Computer Networks, Vol. 47, 445–487, 2005.
  10. Li, S., Zheng, X., Mou, X., Cai, Y, “Chaotic encryption scheme for real-time digital video”, In: Real-Time Imaging VI. Proceedings of SPIE, vol. 4666, 149–160, 2002.
  11. Priti Bali1, “comparative study of private & public key cryptography algorithms: a survey”, IJRET: International Journal of Research in Engineering & Technology , Vol. 03(09) ,191-195, 2014,
  12. Haroon Shakirat Oluwatosin, “Client-Server Model”, IOSR Journal of Computer Engineering (IOSR-JCE), Vol. 16(1), 67-71, 2014.

Keywords

Ad Hoc, Fiber optics, Co-axial cable, Wireless Cable.