期刊文献+

Security in Wireless Mesh Neworks: Challenges and Solutions 被引量:3

Security in Wireless Mesh Neworks: Challenges and Solutions
在线阅读 下载PDF
导出
摘要 Wireless mesh network is a new emerging field with its potential applications in extremely unpredictable and dynamic environments.However,it is particularly vulnerable due to its features of open medium,dynamic changing topology, cooperative routing algorithms.The article surveys the state of the art in security for wireless mesh networks.Firstly,we analyze various possible threats to security in wireless mesh networks.Secondly,we introduce some representative solutions to these threats,including solutions to the problems of key management,secure network routing,and intrusion detection.We also provide a comparison and discussion of their respective merits and drawbacks,and propose some improvements for these drawbacks.Finally,we also discuss the remaining challenges in the area. Wireless mesh network is a new emerging field with its potential applications in extremely unpredictable and dynamic environments. However, it is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative routing algorithms. The article surveys the state of the art in security for wireless mesh networks. Firstly, we analyze various possible threats to security in wireless mesh networks. Secondly, we introduce some representative solutions to these threats, including solutions to the problems of key management, secure network routing, and intrusion detection. We also provide a comparison and discussion of their respective merits and drawbacks, and propose some improvements for these drawbacks. Finally, we also discuss the remaining challenges in the area.
出处 《China Communications》 SCIE CSCD 2009年第3期134-143,共10页 中国通信(英文版)
基金 Project supported by the Shanghai Minicipal Natural Science Foundation(Grant No09ZR1414900) the National High Technology Development 863 Program of China(Grant No2006AA01Z436,No2007AA01Z452,No2009AA01Z118)
关键词 network security wireless mesh networks key management secure network routing intrusion detection 无线通信 通信安全 信号分析 信号处理
作者简介 Ping Yi was born in 1969. Currently he is Associate Professor at School of Information Security Engineering, Shanghai Jiao Tong University in China. He received the BSc degree in department of computer science and engineering from the PLA University of Science and Technology, Nanjing, in 1991. He received the MSc degree in computer science from the Tongji University, Shanghai, in 2003. He received the Ph.D degree at the department of Computing and Information Technology, Fudan University, China. His research interests include mobile computing and ad hoc networks security. He is Project Leader for Intrusion Detection and active protection in Wireless ad hoc Networks, supported by the National High-tech Research and Development Plan of China from 2007 to 2009. He is a member of IEEE Communications and Information Security Technical Committee, Associate Editor for Wiley's Security and Communication Networks (SCN) Journal, Editor for Journal of Security and Telecommunications, Technical Program Committee (TPC) for the ICC'09 CISS (ICC 2009 Communication and Information Systems Security Symposium), the GC'08 CCNS (IEEE Globecom 2008 Computer and Communications Network Security Symposium).
  • 相关文献

参考文献12

  • 1Yi Ping,Hou Yafei,Zhong Yiping,Zhang Shiyong,Dai Zhoulin.Flooding attack and defence in Ad hoc networks[J].Journal of Systems Engineering and Electronics,2006,17(2):410-416. 被引量:5
  • 2Yongguang Zhang,Wenke Lee,Yi-An Huang.Intrusion Detection Techniques for Mobile Wireless Networks[J].Wireless Networks.2003(5)
  • 3Camp,J,Knightly,E.The IEEE 802.11s Extended Serv- ice Set Mesh Networking Standard[].IEEE Communications Magazine.2008
  • 4F.Na?t-Abdesselam,B.Bensaou,T.Taleb.De- tecting and Avoiding Wormhole Attacks in Wireless Ad Hoc Networks[].IEEE Communications Magazine.2008
  • 5Yih-Chun Hu,Adrian Perrig,David Johnson.Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols[].Proceedings of the ACM Workshop on Wireless Security (WiSe ).2003
  • 6Lidong Zhou,Zygmunt J Haas.Securing ad hoc net- works[].IEEE Transactions on Neural Networks.1999
  • 7R.Ostrovsky,M.Yung.How to withstand mobile virus attacks[].Proc of the th ACM Symposium on Principles of Distributed Computing.1991
  • 8Seung Yi,Robin Kravets.MOCA:Mobile CertificateAuthority for Wireless Ad Hoc Networks[].Proc of nd Annual PKI Research Workshop Program (PKI ).2003
  • 9Jiejun Kong,Petros Zerfos,Haiyun Luo,Songwu Lu,Lixia Zhang.Providing Robust and Ubiquitous Security Sup- port for Mobile Ad-Hoc Networks[].IEEE th International Conference on Network Protocols (ICNP’).2001
  • 10Haiyun Luo,Jiejun Kong,Petros Zerfos,Songwu Lu,Lixia Zhang.Self-securing Ad Hoc Wireless Networks[].Proc of the Seventh IEEE Symposium on Computers and Commu- nications (ISCC’).2002

二级参考文献14

  • 1Corson S, Macker J. Mobile Ad hoc networking (MANET) : routing protocol performance issues and evaluation considerations. RFC 2501, 1999.
  • 2David Johnson B, David Maltz A, Yih-Chun Hu. The dynamic source routing Protocol for mobile Ad hoc networks (DSR). http://www. ietf.org/internet-drafts/draft-ietf-manet-dsr-09.tact,2003.
  • 3Charles Perkins E, Elizabeth M. Belding-royer, Samir Das R. Ad hoc on-demand distance vector (AODV)routing, RFC 3561, http:/www.ietf.org/rfc/rfc3561.txt, 2003.
  • 4Schuba C, Krsul I, Kuhn M, et al.Analysis of a denial of service attack on TCP. Proceedings of the 1997 IEEE Symposium on Security and Privacy, Oakland,USA, 1997:208-223.
  • 5Ferguson P, Senie D. Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing. RFC 2267, 1998.
  • 6CIAC, H-02: SUN's TCP SYN Flooding Solutions,Information Bulletin, 1996.
  • 7Aura T, Nikander P. Stateless connections. Proc. of 1st International Conference of Information and Communication Security ( ICICS97 ), Lecture Notes in Computer Science 1334, 1997: 87-97.
  • 8Papadimitratos P, Haas Z. Secure routing for mobile ad hoc networks. Proceedings of the SCS communication Networks and Distributed Systems Modeling and Simulation Conference, San Antonio, TX,2002: 27-31.
  • 9Hu Yichun, Adrian Perrig, David Johnson B. Ariadne:A secure on-demand routing protocol for ad hoc networks. Proceedings of the MobiCom, Atlanta, Georgia, USA, 2002: 12-23.
  • 10Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, et al.Belding-Royer. A secure routing protocol for ad hoc networks. Proceedings of 2002 IEEE International Conference on Network Protocols (ICNP),Paris, France, 2002: 78-86.

共引文献4

同被引文献23

  • 1Akyildiz I F, Wang X. Wireless mesh networks: A survey [J]. Computer Networks, 2005,47 (4) : 445- 487.
  • 2YI Ping, ZHONG Yi-ping, ZHANG Shi-yong, eta Flooding attack and defence in ad hoc networks [J].Journal of Systems Engineering and Electronics, 200 17(2) :410-416.
  • 3Forrest S, Hofmeyr S, Somayaji A. Computer immunology[J]. Communications of the ACM, 1997, 40(10) : 88-96.
  • 4Boukerche, Machado B, Regina L, et al. An agent based and biological inspired real-time intrusion detection and security model for computer network operations [J]. Computer Communications, 2007, 30 (13) : 2649-2660.
  • 5Lebbe A, Agbinya I, Chaczko Z, et al. Artificial immune system inspired danger modeling in wireless mesh networks [C]//Proceedings of the International Conference on Computer and Communication Engineering. Malaysia: IEEE Press, 2008: 984-988.
  • 6Dasgupta D. Advances in artificial immune systems [J].IEEE Computational Intelligence Magazine, 2006,1(4) : 40-49.
  • 7Lau H Y K, Wong V W K. An immunity-based distributed multiagent-control framework [J]. IEEE Transactions on Systems, Man and Cybernetics, Part A, 2006,36(1):91-108.
  • 8Somayaji S, Hofmeyr, Forrest S. Principles of a computer immune system [C]//New Security Paradigms Workshop. New York, USA: ACM, 1998 : 75- 82.
  • 9JIANG Yi-ehuan, JIANG Jiu-chuan, Ishida T. Compatibility between the local and social performances of multi-agent societies [J]. Expert Systems with Applications, 2009, 36(3)..4443-4450.
  • 10JIANG Yi-chuan, JIANG Jiu-chuan. A multi-agent coordination model for the variation of underlying network topology [J]. Expert Systems with Applications, 2005,29 (2) : 372-382.

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部