IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Wireless Mesh Network Security, Architecture, and Protocols

Wireless Mesh Network Security, Architecture, and Protocols
View Sample PDF
Author(s): Sachin Kumar Gupta (Shri Mata Vaishno Devi University, India), Aabid Rashid Wani (Shri Mata Vaishno Devi University, India), Santosh Kumar (Department of Computer Science and Engineering, Dr. SPM IIIT Naya Raipur, Chhattisgarh, India), Ashutosh Srivastava (RST Ecoenergy Private Limited, Mirzapur, India)and Diwankshi Sharma (Shri Mata Vaishno Devi University, India)
Copyright: 2020
Pages: 27
Source title: Security and Privacy Issues in Sensor Networks and IoT
Source Author(s)/Editor(s): Priyanka Ahlawat (National Institute of Technology, Kurukshetra, India)and Mayank Dave (National Institute of Technology, Kurukshetra, India)
DOI: 10.4018/978-1-7998-0373-7.ch001

Purchase

View Wireless Mesh Network Security, Architecture, and Protocols on the publisher's website for pricing and purchasing information.

Abstract

Due to suppression of central administration in WMN, network functioning like network controls, management, routing, switching, packet forwarding etc. are distributed among nodes, either collectively or individually. So, cooperation among nodes is highly solicited. However, there may exist node's malicious activities because of its open characteristics and limited available battery power. The nodes may misbehave by refusing to provide service or dropping down the packets because of its selfishness and malicious activity. The identification of misbehaving nodes and prevention from them can be one of the biggest challenges. Hence, the prime target of the chapter is to provide an overview of existing intrusion detection and prevention approaches, and secure routing or framework that can recognize and prevent from the malicious activities. The digital signature-based IDS to offer secure acknowledgment and an authentication mechanism has also been discussed. The expectation is the digital signature-based IDS will overcome the weakness of existing IDS.

Related Content

Pankaj Bhambri, Alex Khang. © 2024. 17 pages.
Ushaa Eswaran, Vivek Eswaran, Keerthna Murali, Vishal Eswaran. © 2024. 27 pages.
Punam Rattan, Geeta Sharma, Pavitar Prakash Singh. © 2024. 24 pages.
J. Avanija, C. Rajyalakshmi, K. Reddy Madhavi, B. Narendra Kumar Rao. © 2024. 14 pages.
Sajida Mustafa, Rehan Mehmood Sabir, Abid Sarwar, Muhammad Safdar, Mohammed Saleh Al Ansari, Saddam Hussain. © 2024. 26 pages.
Muhammad Fawaz Saleem, Ali Raza, Rehan Mehmood Sabir, Muhammad Safdar, Muhammad Faheem, Mohammed Saleh Al Ansari, Saddam Hussain. © 2024. 29 pages.
Kashif Ali, Zuhaib Nishtar, Rehan Mehmood Sabir, Muhammad Safdar. © 2024. 20 pages.
Body Bottom