Affiliation:
1. Shri Mata Vaishno Devi University, India
2. Department of Computer Science and Engineering, Dr. SPM IIIT Naya Raipur, Chhattisgarh, India
3. RST Ecoenergy Private Limited, Mirzapur, India
Abstract
Due to suppression of central administration in WMN, network functioning like network controls, management, routing, switching, packet forwarding etc. are distributed among nodes, either collectively or individually. So, cooperation among nodes is highly solicited. However, there may exist node's malicious activities because of its open characteristics and limited available battery power. The nodes may misbehave by refusing to provide service or dropping down the packets because of its selfishness and malicious activity. The identification of misbehaving nodes and prevention from them can be one of the biggest challenges. Hence, the prime target of the chapter is to provide an overview of existing intrusion detection and prevention approaches, and secure routing or framework that can recognize and prevent from the malicious activities. The digital signature-based IDS to offer secure acknowledgment and an authentication mechanism has also been discussed. The expectation is the digital signature-based IDS will overcome the weakness of existing IDS.
Reference62 articles.
1. Wireless Mesh Networks
2. Wireless mesh networks: a survey
3. Asherson, S. & Hutchison, A. (n.d.). Secure routing in wireless mesh networks, University of Cape Town. Retrieved from http://pubs.cs.uct.ac.za/archive/00000318/01/SATNAC2006WIP.pdf
4. Modeling tools for detecting DoS attacks in WSNs
5. Improving security in WMNs with reputation systems and self-organizing maps
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献