With the rapid development of the WLAN,the 802. 11 s mesh network is emerging.Reliability,adaptability and scalability are the most important attributes of a mesh network.However,the security in an 802.11s mesh networ...With the rapid development of the WLAN,the 802. 11 s mesh network is emerging.Reliability,adaptability and scalability are the most important attributes of a mesh network.However,the security in an 802.11s mesh network is not well defined or specified,and there is no standard method to authenticate a mesh point that is creating a mesh link.In this paper,we propose solutions for the authentication of mesh points.For the Basic Infrastructure Security Mode,we combine the 802.1X/EAP and neighbor graph to realize the fast mutual authentication between a new mesh point and every its mesh link.We prove that our scheme maintains the security of the standardized EAP authentication algorithm.At the same time,the simulation result shows that the authentication latency of our scheme is much lower than that of the scheme in[2].In the Basic Decentralized Security Mode(BDSM),802.11s mesh networks are very similar to ad hoc networks,but they are different in several aspects.We first analyze the differences between them.Based on this analysis, we investigate the main authentication methods used in ad hoc networks and select the pairwise key pre-distribution model and identity-based model for the WLAN mesh network.展开更多
In a Wireless Mesh Network(WMN),the convenience of a routing strategy strongly depends on the mobility of the intermediate nodes that compose the paths.Taking this behaviour into account,this paper presents a routing ...In a Wireless Mesh Network(WMN),the convenience of a routing strategy strongly depends on the mobility of the intermediate nodes that compose the paths.Taking this behaviour into account,this paper presents a routing scheme that works differently accordingly to the node mobility.In this sense,a proactive routing scheme is restricted to the backbone to promote the use of stable routes.Conversely,the reactive protocol is used for searching routes to or from a mobile destination.Both approaches are simultaneously implemented in the mesh nodes so that the routing protocols share routing information that optimises the network performance.Aimed at guaranteeing the IP compatibility,the combination of the two protocols in the core routers is carried out in the Medium Access Control(MAC)layer.In contrast to the operation in the IP layer where two routing protocols cannot work concurrently,the transfer of the routing tasks to the MAC layer enables the use of multiple independent forwarding tables.Simulation results show the advantage of the proposal in terms of packet losses and data delay.展开更多
The Network Layer in wireless mesh networks is responsible for routing packets making it a prime target for intruders and hackers. Black-hole attack is a type of denial-of-service attack which when carried out can dis...The Network Layer in wireless mesh networks is responsible for routing packets making it a prime target for intruders and hackers. Black-hole attack is a type of denial-of-service attack which when carried out can disrupt the services of this layer. This paper takes a look at some important detection and mitigation techniques and presents the drawbacks. After analysis of current mechanisms, the paper proposes RID-AODV, a security solution for multiple black-hole attack in wireless mesh networks. Based on the backbone of AODV, RID-AODV combines the ability of route skipping of IDSAODV and route failure correction using reverse route establishment of RAODV. The enhanced protocol RID-AODV, AODV, IDSAODV, and RAODV are implemented in a simulated environment using ns-2.35 simulator. The networks for each protocol are bombarded with up to ten black-hole nodes starting from zero. The results obtained are then analyzed and compared and a discussion is presented.展开更多
基金supported by National Natural Science Foundation of China(Grant No.60633020, 90204012,60573035,60573036)
文摘With the rapid development of the WLAN,the 802. 11 s mesh network is emerging.Reliability,adaptability and scalability are the most important attributes of a mesh network.However,the security in an 802.11s mesh network is not well defined or specified,and there is no standard method to authenticate a mesh point that is creating a mesh link.In this paper,we propose solutions for the authentication of mesh points.For the Basic Infrastructure Security Mode,we combine the 802.1X/EAP and neighbor graph to realize the fast mutual authentication between a new mesh point and every its mesh link.We prove that our scheme maintains the security of the standardized EAP authentication algorithm.At the same time,the simulation result shows that the authentication latency of our scheme is much lower than that of the scheme in[2].In the Basic Decentralized Security Mode(BDSM),802.11s mesh networks are very similar to ad hoc networks,but they are different in several aspects.We first analyze the differences between them.Based on this analysis, we investigate the main authentication methods used in ad hoc networks and select the pairwise key pre-distribution model and identity-based model for the WLAN mesh network.
文摘In a Wireless Mesh Network(WMN),the convenience of a routing strategy strongly depends on the mobility of the intermediate nodes that compose the paths.Taking this behaviour into account,this paper presents a routing scheme that works differently accordingly to the node mobility.In this sense,a proactive routing scheme is restricted to the backbone to promote the use of stable routes.Conversely,the reactive protocol is used for searching routes to or from a mobile destination.Both approaches are simultaneously implemented in the mesh nodes so that the routing protocols share routing information that optimises the network performance.Aimed at guaranteeing the IP compatibility,the combination of the two protocols in the core routers is carried out in the Medium Access Control(MAC)layer.In contrast to the operation in the IP layer where two routing protocols cannot work concurrently,the transfer of the routing tasks to the MAC layer enables the use of multiple independent forwarding tables.Simulation results show the advantage of the proposal in terms of packet losses and data delay.
文摘The Network Layer in wireless mesh networks is responsible for routing packets making it a prime target for intruders and hackers. Black-hole attack is a type of denial-of-service attack which when carried out can disrupt the services of this layer. This paper takes a look at some important detection and mitigation techniques and presents the drawbacks. After analysis of current mechanisms, the paper proposes RID-AODV, a security solution for multiple black-hole attack in wireless mesh networks. Based on the backbone of AODV, RID-AODV combines the ability of route skipping of IDSAODV and route failure correction using reverse route establishment of RAODV. The enhanced protocol RID-AODV, AODV, IDSAODV, and RAODV are implemented in a simulated environment using ns-2.35 simulator. The networks for each protocol are bombarded with up to ten black-hole nodes starting from zero. The results obtained are then analyzed and compared and a discussion is presented.