Review On Securing Of Wireless Mesh Network From Denial Of Services
Keywords:
mesh, Decryption, Mechanisms, clientsAbstract
A wireless mesh network is a communications network made up of radio nodes organized in a mesh topology. It is also a form of wireless ad hoc network. Wireless mesh networks often consist of mesh clients, mesh routers and gateways. In our research we have discussed security issues related to Wireless Network. The distributed network computing model allows all network computer system systems to take part within processing but at their respective ends, separately. This model allows sharing data & services but does not help other network computer system systems within processing. The objectives of research are to establishment of Distributed Network Environment & creation of Wireless mesh within this Distributed Environment. After that we will study of Existing Security loop holes within wireless mesh based distributed network environment. Then we will create a new security mechanism to enhance security of data on wireless mesh network by customizing existing Encryption & Decryption Mechanisms. The main objective is to boost outer layer security by enhancing packet filter mechanism.
References
IEEE 802.11 Wireless LAN Security Overview by Ahmed M. Al Naamany , Ali Al Shidhani, Hadj Bourdoucen, Department of Electrical & Computer Engineering – Sultan Qaboos University, Oman. IJCSNS International Journal of Computer Science & Network Security, VOL.6 No.5B, May 2006
SECURITY AND PRIVACY IN EMERGING WIRELESS NETWORKS BY DI MA UNIVERSITY OF MICHIGAN-DEARBORN, IEEE Wireless Communications October 2011 [3] Efficient Gossip Protocols for Verifying Consistency of Certificate Logs by Laurent Chuat ETH Zurich, Pawel Szalachowski ETH Zurich
Attacks within Wireless Networks Yih-Chun Hu, Member, IEEE, Adrian Perrig, Member, IEEE, & David B. Johnson, Member, IEEE, IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 2, FEBRUARY 2006
Lightweight Hidden Services by Andriy Panchenko, Otto Spanioly, Andre Egnersy, & Thomas Engel Computer Science department, RWTH Aachen University, Germany within June 2011
In 2011 PFS: Probabilistic Filter Scheduling Against Distributed Denial-of-Service Attacks 36th Annual IEEE Conference on Local Computer Networks, 978-1-61284-927-0/10/$26.00 ©2011 IEEE
D. K. Y. Yau, J. C. S. Lui, F. Liang, & Y. Yam, “Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles,” IEEE/ACM Trans. Netw., vol. 13, no. 1, pp. 29–42, 2005.
X. Yang, D. Wetherall, & T. E. Anderson, “TVA: a DoS-limiting network architecture,” IEEE/ACM Trans. Netw., vol. 16, no. 6, pp. 1267–1280, 2008.
M. Sung & J. Xu, “IP traceback-based intelligent packet filtering: A novel technique for defending against internet DDoS attacks,” IEEE Trans. Parallel Distrib. Syst., vol. 14, no. 9, pp. 861–872, 2003.
S. Savage, D. Wetherall, A. Karlin, & T. Anderson, “Practical Network Support for IP Traceback,” within Proc. of ACM SIGCOMM, Aug. 2000, pp.295–396.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2016 International Journal for Research Publication and Seminar
This work is licensed under a Creative Commons Attribution 4.0 International License.
Re-users must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. This license allows for redistribution, commercial and non-commercial, as long as the original work is properly credited.