“…Many frameworks and architectures have separately addressed security or performance management [5], [6], [7], [8], [9], [10] on WMNs. The Real-time cross-layer flood detection and attack trace-back (RCFDAT) [5] intends to detect multi-layer flooding attacks.…”
Section: Related Workmentioning
confidence: 99%
“…For that, it encrypts all data on the wireless links and authenticates mesh routers with a centralized server. The Secure Channel Assignment (SeCA) framework [7] protects the channel assignment protocol against malicious activities, using mechanisms to verify processes executed by each neighboring node, such as dissemination of information, channel assignment, notification and channel switching.…”
Wireless mesh networks (WMNs) have emerged to support applications on various domains, such as military, financial and healthcare, that claim for high level of both security and performance. Since WMNs are susceptible to security issues, and their devices own limitations that can compromise network performance, this paper presents SECOM, a framework for self-configuration of WMNs to provide simultaneously security and performance. It comprises of different functional blocks to manage and adapt network services guaranteeing application requirements. We employ the framework on routing essential service, applying different security mechanisms and redundancies in network and link layers to assist route selection. Simulation results show that our framework enhances both security and performance, with low cost in terms of latency.
“…Many frameworks and architectures have separately addressed security or performance management [5], [6], [7], [8], [9], [10] on WMNs. The Real-time cross-layer flood detection and attack trace-back (RCFDAT) [5] intends to detect multi-layer flooding attacks.…”
Section: Related Workmentioning
confidence: 99%
“…For that, it encrypts all data on the wireless links and authenticates mesh routers with a centralized server. The Secure Channel Assignment (SeCA) framework [7] protects the channel assignment protocol against malicious activities, using mechanisms to verify processes executed by each neighboring node, such as dissemination of information, channel assignment, notification and channel switching.…”
Wireless mesh networks (WMNs) have emerged to support applications on various domains, such as military, financial and healthcare, that claim for high level of both security and performance. Since WMNs are susceptible to security issues, and their devices own limitations that can compromise network performance, this paper presents SECOM, a framework for self-configuration of WMNs to provide simultaneously security and performance. It comprises of different functional blocks to manage and adapt network services guaranteeing application requirements. We employ the framework on routing essential service, applying different security mechanisms and redundancies in network and link layers to assist route selection. Simulation results show that our framework enhances both security and performance, with low cost in terms of latency.
“…Compared with SmartC, the monitoring mechanism has more candidates of the channel scanner. In , the SeCA mechanism, which divides the network into several regions, was proposed. The regional verifiers, which are chosen by the random seeds from the trusted nodes, validates the control messages and channel operations in channel assignment.…”
Section: Related Workmentioning
confidence: 99%
“…We evaluate the performance of the HYA‐JAS scheme and compare it with two representative benchmarks, SeCA and SmartC . We consider a WMN with several mesh nodes, each equipped with three radios.…”
Nowadays, multi-radio multi-channel wireless mesh networks have been widely exploited to provide high-speed Internet access. By assigning different channels, the interference between wireless mesh network nodes can be greatly reduced, leading to a better network performance. However, the channel assignment attacks have imposed a serious security problem, where the diverse messages, that is, Channel Usage Message (CUM), Channel Change Message (CCM), Channel Switch Operation (CSO) and Security Alarm Message (SAM), are often used to launch attacks by the malicious nodes in order to disturb the normal channel assignment and thus the overall network performance. In this paper, we propose a joint anti-attack scheme (JAS) against the channel assignment attacks. Our JAS is composed of four key components: CUM, CCM, CSO and SAM defense schemes to protect the channel assignment. The CUM defense scheme verifies the CUM messages and their sender. The CCM defense scheme employs three rounds of CCM verifications. Furthermore, three control messages are exploited by the CSO defense scheme. The SAM defense scheme offers two rounds of verification for the alarm messages. Moreover, we apply our JAS to a popular distributed channel assignment algorithm, that is, Hyacinth. Through extensive simulation, the performance of the proposed scheme is evaluated by comparing with SeCA and SmartC in terms of Goodput and additional overhead. Observed from the simulation results, our scheme is demonstrated to outperform the best-known secure channel assignment algorithms.
“…In this phase, nodes listen on channels and collect the required data from their x‐hop away neighbor nodes in case of decentralized or all nodes in centralized fashion. The collected data can be related to bandwidth, channel usage, hop‐count distance from the wired gateway, measured load, throughput of interfering neighbors, the assigned superimposed codes, and link status to name a few . The comprehensiveness and accuracy of data driven by this phase has direct impact on the node's ability to choose the best possible channel in the following decision‐making step.…”
Wireless mesh network (WMN) has been deployed as a key and progressing technology all around the world to provide the end-to-end users with high quality of service. Regarding of its major design concern as network throughput, WMN has been evolved based on multi-channel multi-radio strategy to make simultaneous transmissions possible. The advent of this significant improvement has introduced other challenging issues such as channel assignment (CA). Its core strategy applied in multi-radio multi-channel WMNs to promote achievable capacity using properly mapping the available channels to the radio interfaces. Although, in recent years, there are a number of research studies on CA's improvement, there are some security drawbacks that should be addressed. Most of CA schemes assume all nodes involved in CA techniques are trustworthy. This unrealistic assumption and misbehavior of those nodes makes the network susceptible to various security attacks which lead to performance degradation. This paper presents an in-depth survey of the CA's attacks as well as detection or prevention mechanism found in the literature. The attacks are classified into two groups: attacks imposed by the malicious neighbor as well as by the assigner or the assignee. In addition, a comparative and analytical discussion is provided on current solutions and their open problems. According to conducted analysis, the current knowledge gap leading to most of these attacks is lack of accurate verification because of implicit trust in nodes in CA procedure. Although, there are some research studies proposing kinds of case-specific verification, they cannot close the gap properly, and there is a need to comprehensive approach. Finally, reviewing state-of-the-art of related works shows, there are more possible attacks such as collusion or multistage attacks that have not taken into account so far.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.