CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Security of Wireless Mesh Network from Denial of Service Attack

by Sunita Rani, Shweta Nijhawan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 172 - Number 7
Year of Publication: 2017
Authors: Sunita Rani, Shweta Nijhawan
10.5120/ijca2017915182

Sunita Rani, Shweta Nijhawan . Security of Wireless Mesh Network from Denial of Service Attack. International Journal of Computer Applications. 172, 7 ( Aug 2017), 25-29. DOI=10.5120/ijca2017915182

@article{ 10.5120/ijca2017915182,
author = { Sunita Rani, Shweta Nijhawan },
title = { Security of Wireless Mesh Network from Denial of Service Attack },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2017 },
volume = { 172 },
number = { 7 },
month = { Aug },
year = { 2017 },
issn = { 0975-8887 },
pages = { 25-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume172/number7/28264-2017915182/ },
doi = { 10.5120/ijca2017915182 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:19:43.633691+05:30
%A Sunita Rani
%A Shweta Nijhawan
%T Security of Wireless Mesh Network from Denial of Service Attack
%J International Journal of Computer Applications
%@ 0975-8887
%V 172
%N 7
%P 25-29
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A wireless mesh network is correspondences arrange comprised of radio hubs sorted out in a mesh topology. It is additionally a type of wireless ad hoc network. It is also a form of wireless ad hoc network. Wireless mesh networks often consist of mesh clients, mesh routers & gateways. In this, discussed security issues related to Wireless Network. Then, study of Existing Security loop holes within wireless mesh based distributed network environment. Objective of research is to develop system to make Wireless mesh network secure form denial of service attack.

References
  1. Anil Kumar Gankotiya , Sahil Seth , Gurdit Singh , “Performance Analysis of Secure Wireless Mesh Networks” , Research Journal of Recent Sciences Vol. 1(3), 80-85, March 2012 .
  2. Monika, “Denial of Service Attacks in Wireless Mesh Networks”, International Journal of Computer Science and Information Technologies, Vol. 3 (3), 4516-4522, 2012.
  3. Priya Maidamwar & Nekita Chavhan, “security issues to detect wormhole attack in wireless sensor network”, International Journal on AdHoc Networking Systems (IJANS) Vol. 29(4), 37-50, October 2012.
  4. Pooja Sharma, “performance analysis of secure wireless mesh networks” International Journal of Research in Science & Technology (IJRST) 2013, Vol. 3(4), 65-75, 2013.
  5. Khaled M.Elleithy, Drazen Blagovic, Wang K. Cheng, Paul Sideleau, “Denial of Service Attack Techniques: Analysis, Implementation & Comparison”, Journal of Systemics, Cybernetics, & Informatics 3.1, 66-71, 2005.
  6. Manjula K G, M N Ravikumar, “Color Image Encryption & Decryption Using DES Algorithm”, International Research Journal of Engineering & Technology, Vol. 03(07), 1715-1718, 2016.
  7. Madhumita Panda, “Data Security in Wireless Sensor Networks via AES Algorithm” IEEE Sponsored 9th International Conference on Intelligent Systems & Control, 2015.
  8. Yanchao Zhang & Yuguang Fang, “ARSA: An Attack-Resilient Security Architecture for Multihop Wireless Mesh Networks”,IEEE journal on selected areas in communications, vol. 24(10), 1916-1928, 2006.
  9. Ian F. Akyildiz, Xudong Wang, Weilin Wang “Wireless mesh networks: a survey”, Computer Networks, Vol. 47, 445–487, 2005.
  10. Li, S., Zheng, X., Mou, X., Cai, Y, “Chaotic encryption scheme for real-time digital video”, In: Real-Time Imaging VI. Proceedings of SPIE, vol. 4666, 149–160, 2002.
  11. Priti Bali1, “comparative study of private & public key cryptography algorithms: a survey”, IJRET: International Journal of Research in Engineering & Technology , Vol. 03(09) ,191-195, 2014,
  12. Haroon Shakirat Oluwatosin, “Client-Server Model”, IOSR Journal of Computer Engineering (IOSR-JCE), Vol. 16(1), 67-71, 2014.
Index Terms

Computer Science
Information Sciences

Keywords

Ad Hoc Fiber optics Co-axial cable Wireless Cable.