Information security in computer networks with dynamic topology

This paper reviews security problems in computer networks with dynamically reconfigurable topology (e.g. mesh, MANET, computing grid, virtualized network clusters, fog computing network). The dynamically organized networks might be subjected to some specific computer attacks, which are analyzed within this paper. Different methods of security improvement are discussed, and a new method of security flaws detection based on graph modeling is suggested.

[1]  Jonathan Loo,et al.  Framework for intrusion detection in IEEE 802.11 wireless mesh networks , 2010, Int. Arab J. Inf. Technol..

[2]  Celia Li,et al.  Secure Routing for Wireless Mesh Networks , 2011, Int. J. Netw. Secur..

[3]  Xinheng Wang Wireless mesh networks , 2008, Journal of telemedicine and telecare.

[4]  Zhang Minqing,et al.  The research on certificateless hierarchical key management in wireless mesh network , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[5]  United Arab Emirates,et al.  Dealing with Sinkhole Attacks in Wireless Sensor Networks , 2013 .

[6]  Rupinder Kaur,et al.  Black Hole and Greyhole Attack in Wireless Mesh Network , 2014 .

[7]  Xia Wang,et al.  A heterogeneity-aware framework for group key management in wireless mesh networks , 2008, SecureComm.

[8]  Jiang Li,et al.  Attacks and Countermeasures in Sensor Networks: A Survey , 2010 .

[9]  Robin Kravets,et al.  Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.

[10]  Ian F. Akyildiz,et al.  Wireless mesh networks: a survey , 2005, Comput. Networks.

[11]  Simon Pietro Romano,et al.  A Reputation-Based Metric for Secure Routing in Wireless Mesh Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[12]  Zonghua Zhang,et al.  RADAR: A ReputAtion-Based Scheme for Detecting Anomalous Nodes in WiReless Mesh Networks , 2008, 2008 IEEE Wireless Communications and Networking Conference.

[13]  Yuguang Fang,et al.  ARSA: An Attack-Resilient Security Architecture for Multihop Wireless Mesh Networks , 2006, IEEE Journal on Selected Areas in Communications.

[14]  Jason Smith,et al.  Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks , 2006, ACSW.

[15]  Elizabeth M. Belding-Royer,et al.  Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.

[16]  Reza Curtmola,et al.  Secure Routing in Wireless Mesh Networks , 2011, Encyclopedia of Cryptography and Security.