Review On Securing Of Wireless Mesh Network From Denial Of Services

Authors

  • Mukesh Kumar Research Scholar, Department of CSE, CBS group of Institutions Jhajhar
  • Pooja Dhankhar assistant professor, Department of CSE, CBS group of institutions jhajhar

Keywords:

mesh, Decryption, Mechanisms, clients

Abstract

A wireless mesh network is a communications network made up of radio nodes organized in a mesh topology. It is also a form of wireless ad hoc network. Wireless mesh networks often consist of mesh clients, mesh routers and gateways. In our research we have discussed security issues related to Wireless Network. The distributed network computing model allows all network computer system systems to take part within processing but at their respective ends, separately. This model allows sharing data & services but does not help other network computer system systems within processing. The objectives of research are to establishment of Distributed Network Environment & creation of Wireless mesh within this Distributed Environment. After that we will study of Existing Security loop holes within wireless mesh based distributed network environment. Then we will create a new security mechanism to enhance security of data on wireless mesh network by customizing existing Encryption & Decryption Mechanisms. The main objective is to boost outer layer security by enhancing packet filter mechanism.

References

IEEE 802.11 Wireless LAN Security Overview by Ahmed M. Al Naamany , Ali Al Shidhani, Hadj Bourdoucen, Department of Electrical & Computer Engineering – Sultan Qaboos University, Oman. IJCSNS International Journal of Computer Science & Network Security, VOL.6 No.5B, May 2006

SECURITY AND PRIVACY IN EMERGING WIRELESS NETWORKS BY DI MA UNIVERSITY OF MICHIGAN-DEARBORN, IEEE Wireless Communications October 2011 [3] Efficient Gossip Protocols for Verifying Consistency of Certificate Logs by Laurent Chuat ETH Zurich, Pawel Szalachowski ETH Zurich

Attacks within Wireless Networks Yih-Chun Hu, Member, IEEE, Adrian Perrig, Member, IEEE, & David B. Johnson, Member, IEEE, IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 2, FEBRUARY 2006

Lightweight Hidden Services by Andriy Panchenko, Otto Spanioly, Andre Egnersy, & Thomas Engel Computer Science department, RWTH Aachen University, Germany within June 2011

In 2011 PFS: Probabilistic Filter Scheduling Against Distributed Denial-of-Service Attacks 36th Annual IEEE Conference on Local Computer Networks, 978-1-61284-927-0/10/$26.00 ©2011 IEEE

D. K. Y. Yau, J. C. S. Lui, F. Liang, & Y. Yam, “Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles,” IEEE/ACM Trans. Netw., vol. 13, no. 1, pp. 29–42, 2005.

X. Yang, D. Wetherall, & T. E. Anderson, “TVA: a DoS-limiting network architecture,” IEEE/ACM Trans. Netw., vol. 16, no. 6, pp. 1267–1280, 2008.

M. Sung & J. Xu, “IP traceback-based intelligent packet filtering: A novel technique for defending against internet DDoS attacks,” IEEE Trans. Parallel Distrib. Syst., vol. 14, no. 9, pp. 861–872, 2003.

S. Savage, D. Wetherall, A. Karlin, & T. Anderson, “Practical Network Support for IP Traceback,” within Proc. of ACM SIGCOMM, Aug. 2000, pp.295–396.

Downloads

Published

30-09-2016

How to Cite

Mukesh Kumar, & Pooja Dhankhar. (2016). Review On Securing Of Wireless Mesh Network From Denial Of Services. International Journal for Research Publication and Seminar, 7(7), 80–86. Retrieved from https://jrps.shodhsagar.com/index.php/j/article/view/942

Issue

Section

Original Research Article