Skip to main content

Receiver Based Traffic Control Mechanism to Protect Low Capacity Network in Infrastructure Based Wireless Mesh Network

  • Conference paper
Information Security and Assurance (ISA 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 76))

Included in the following conference series:

  • 1056 Accesses

Abstract

Infrastructure-based Wireless Mesh Networks are emerging as an affordable, robust, flexible and scalable technology. With the advent of Wireless Mesh Networks (WMNs) the dream of connecting multiple technology based networks seems to come true. A fully secure WMN is still a challenge for the researchers. In infrastructure-based WMNs almost all types of existing Wireless Networks like Wi-Fi, Cellular, WiMAX, and Sensor etc can be connected through Wireless Mesh Routers (WMRs). This situation can lead to a security problem. Some nodes can be part of the network with high processing power, large memory and least energy issues while others may belong to a network having low processing power, small memory and serious energy limitations. The later type of the nodes is very much vulnerable to targeted attacks. In our research we have suggested to set some rules on the WMR to mitigate these kinds of targeted flooding attacks. The WMR will then share those set of rules with other WMRs for Effective Utilization of Resources.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akyildiz, I.F., Wang, X., Wang, W.: Wireless mesh networks: a survey Broad band and Wireless Networking, (BWN) Lab, School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta (January 1, 2005)

    Google Scholar 

  2. Dilmaghani, R.B., Rao, R.R.: Hybrid Wireless Mesh Network with Application to Emergency Scenarios. Journal of Software 3(2), 52–60 (2008)

    Article  Google Scholar 

  3. Yan, W., Ren, M., Zhao, T., Li, X.: A Bandwidth Management Scheme Support for Real-time Applications in Wireless Mesh Networks. In: ACM symposium on Applied computing Computer networks, Fortaleza, Ceara, Brazil, pp. 2063–2068 (2008)

    Google Scholar 

  4. Akyidiz, I.F., Wang, X., Wang, W.: Wireless Mesh Network: a Survey. The International Journal of Computer and Telecommunications Networking 47(4), 445–487 (2004)

    Google Scholar 

  5. Mynampati, V., Kandula, D., Garimilla, R., Srinivas, K.: Performance and Security of Wireless Mesh Networks, Blekinge Institute of Technology (June 2009)

    Google Scholar 

  6. Kone, V., Das, S., Zhao, B.Y., Zheng, H.: QUORUM: quality of service in wireless mesh networks. Mobile Networks and Applications 12(5), 358–369 (2007)

    Article  Google Scholar 

  7. Hugelshofer, F., Smith, P., Hutchison, D., Race, N.J.P.: OpenLIDS: A Light weight Intrusion Detection System for Wireless Mesh Networks. In: International Conference on Mobile Computing and Networking, Beijing, China (2009)

    Google Scholar 

  8. YeYan, JiannongCao, ZhuLi: Stochastic Security Performance of Active Cache Based Defense against DoS Attacks in Wireless Mesh Network. In: Second International Conference on Advances in Mesh Networks, Athens/Glyfada, Greece (2009)

    Google Scholar 

  9. XiaWang, Wong, J.S., Stanley, F., SamikBasu: Cross-layer Based Anomaly Detection in Wireless Mesh Networks. In: Ninth Annual International Symposium on Applications and the Internet, Washington, DC, USA (2009)

    Google Scholar 

  10. KuiRen, ShuchengYu, WenjingLou, YanchaoZhang: PEACE: Privacy-Enhancement Yet Accountable Security Framework. IEEE transactions on parallel and distributed systems 21(2), 1045–9219 (2010)

    Google Scholar 

  11. Bezahaf, M., LuigiIanonne: Practical DHT-Based Location Service for Wireless Mesh Networks. In: International Conference on Emerging Networking Experiments and Technologies, Rome, Italy, pp. 47–48 (2009)

    Google Scholar 

  12. Khan, Z.S., Sher, M., Rashid, K., Rahim, A.: A Three-Layer Secure Architecture for IP Multimedia Subsystem-Based Instant Messaging. Information Security Journal: A Global Perspective 18(3), 139–148 (2009)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gilani, S.S.A., Zubair, M., Khan, Z.S. (2010). Receiver Based Traffic Control Mechanism to Protect Low Capacity Network in Infrastructure Based Wireless Mesh Network. In: Bandyopadhyay, S.K., Adi, W., Kim, Th., Xiao, Y. (eds) Information Security and Assurance. ISA 2010. Communications in Computer and Information Science, vol 76. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13365-7_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-13365-7_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-13364-0

  • Online ISBN: 978-3-642-13365-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics