Survey on Attacks Pertaining to Wireless Mesh Networks and Approach towards Counter Measures

Wireless Mesh Networks (WMN) is an integral broadband wireless network who provides high bandwidth internet service to users. It is kind of multi-hop networks having many to many connections with the capability of dynamic sanify network topology. WMN’s utility network performance can cause a massive fall. Channel your physical security vulnerabilities, due to the dynamic changes of topology is a major challenging issue. Self –Configuration is a wireless mesh network self-organized nature make it vulnerable to various type of more attacks .In this paper we have discussed Some attacks that TCP / IP model are performed at different layers of security challenges, analyzing the counter remedies and protection mechanisms in place various attacks listed. Some attacks that TCP / IP model, are performed at different layers of security challenges, analyzing the counter remedies and protection mechanisms in place various attacks listed.

[1]  Yih-Chun Hu,et al.  Efficient Security Mechanisms for Routing Protocolsa , 2003, NDSS.

[2]  Hassnaa Moustafa Providing Authentication, Trust, and Privacy in Wireless Mesh Networks , 2008 .

[3]  Phone Lin,et al.  A study on distributed/centralized scheduling for wireless mesh network , 2006, IWCMC '06.

[4]  Divya Bansal,et al.  Selfish MAC Misbehaviour Detection in Wireless Mesh Network , 2010, 2010 International Conference on Advances in Computer Engineering.

[5]  Xianjie Wu,et al.  Application of Wireless Mesh Network in campus network , 2010, 2010 Second International Conference on Communication Systems, Networks and Applications.

[6]  Ian F. Akyildiz,et al.  Wireless mesh networks: a survey , 2005, Comput. Networks.

[7]  Mihaela Cardei,et al.  A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .

[8]  Yih-Chun Hu Efficient Security Mechanisms for Routing Protocols , 2003 .

[9]  Weihua Zhuang,et al.  Distributed medium access control for wireless mesh networks , 2006, Wirel. Commun. Mob. Comput..

[10]  V. S. Shankar Sriram,et al.  Methodology for Securing Wireless LANs Against Wormhole Attack , 2009 .

[11]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[12]  Çetin Kaya Koç,et al.  High-speed implementation of an ECC-based wireless authentication protocol on an ARM microprocessor , 2001 .

[13]  Tarun Kumar,et al.  Threats and Vulnerabilities in Wireless Mesh Networks , 2009 .

[14]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[15]  Monika Denial of Service Attacks in Wireless Mesh Networks , 2012 .

[16]  Mary Saira Bhanu,et al.  A Survey of Secure Routing Protocols for Wireless Mesh Networks , 2014 .

[17]  Sahil Seth,et al.  Denial of Service Attacks and Detection Methods in Wireless Mesh Networks , 2010, 2010 International Conference on Recent Trends in Information, Telecommunication and Computing.