Wireless Mesh Network Security
 
SoS Logo

Wireless Mesh Network Security

With more than 70 protocols vying for preeminence over wireless mesh networks, the security problem is magnified.  The research cited here was presented in 2014 and covers smart grid, specific protocols, 4-way handshaking, and fuzzy protocols.

Saavedra Benitez, Y.I.; Ben-Othman, J.; Claude, J.-P., "Performance Evaluation of Security Mechanisms in RAOLSR Protocol for Wireless Mesh Networks," Communications (ICC), 2014 IEEE International Conference on, pp. 1808, 1812, 10-14 June 2014. doi: 10.1109/ICC.2014.6883585 In this paper, we have proposed the IBE-RAOLSR and ECDSA-RAOLSR protocols for WMNs (Wireless Mesh Networks), which contributes to security routing protocols. We have implemented the IBE (Identity Based Encryption) and ECDSA (Elliptic Curve Digital Signature Algorithm) methods to secure messages in RAOLSR (Radio Aware Optimized Link State Routing), namely TC (Topology Control) and Hello messages. We then compare the ECDSA-based RAOLSR with IBE-based RAOLSR protocols. This study shows the great benefits of the IBE technique in securing RAOLSR protocol for WMNs. Through extensive ns-3 (Network Simulator-3) simulations, results have shown that the IBE-RAOLSR outperforms the ECDSA-RAOLSR in terms of overhead and delay. Simulation results show that the utilization of the IBE-based RAOLSR provides a greater level of security with light overhead.

Keywords: cryptography; routing protocols; telecommunication control; telecommunication network topology; wireless mesh networks; ECDSA-RAOLSR protocols; IBE-RAOLSR protocols; WMN; elliptic curve digital signature algorithm; hello messages; identity based encryption; network simulator-3 simulations; radio aware optimized link state routing; routing protocols; security mechanisms ;topology control; wireless mesh networks; Delays; Digital signatures; IEEE 802.11 Standards; Routing; Routing protocols; IBE; Identity Based Encryption; Radio Aware Optimized Link State Routing; Routing Protocol; Security; Wireless Mesh Networks (ID#: 15-3695)

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6883585&isnumber=6883277

Tsado, Y.; Lund, D.; Gamage, K., "Resilient Wireless Communication Networking For Smart Grid BAN," Energy Conference (ENERGYCON), 2014 IEEE International, pp.846, 851, 13-16 May 2014. doi: 10.1109/ENERGYCON.2014.6850524 The concept of Smart grid technology sets greater demands for reliability and resilience on communications infrastructure. Wireless communication is a promising alternative for distribution level, Home Area Network (HAN), smart metering and even the backbone networks that connect smart grid applications to control centers. In this paper, the reliability and resilience of smart grid communication network is analyzed using the IEEE 802.11 communication technology in both infrastructure single hop and mesh multiple-hop topologies for smart meters in a Building Area Network (BAN). Performance of end to end delay and Round Trip Time (RTT) of an infrastructure mode smart meter network for Demand Response (DR) function is presented. Hybrid deployment of these network topologies is also suggested to provide resilience and redundancy in the network during network failure or when security of the network is circumvented. This recommendation can also be deployed in other areas of the grid where wireless technologies are used. DR communication from consumer premises is used to show the performance of an infrastructure mode smart metering network.

Keywords: home automation; home networks; redundancy; sensor placement; smart meters; smart power grids; telecommunication network reliability; telecommunication network topology; telecommunication security; wireless LAN; DR communication; IEEE 802.11 communication technology; RTT; backbone networks; building area network; control center; demand response function; distribution level; end to end delay; home area network; hybrid deployment; infrastructure mode smart meter network; infrastructure single hop topology; mesh multiple hop topology; network failure; network reliability; network security; redundancy; resilient wireless communication networking; round trip time; smart grid BAN; wireless technology; IEEE 802.11 Standards; Network topology; Resilience; Smart grids; Smart meters; Wireless communication; Infrastructure mode; Multi-hop mesh network ;Resilience; Single-hop network (ID#: 15-3696)

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6850524&isnumber=6850389

Ghatak, Sumitro; Bose, Sagar; Roy, Siuli, "Intelligent Wall Mounted Wireless Fencing System Using Wireless Sensor Actuator Network," Computer Communication and Informatics (ICCCI), 2014 International Conference on, pp.1,5, 3-5 Jan. 2014. doi: 10.1109/ICCCI.2014.6921795 This paper presents the relative merits of IR and microwave sensor technology and their combination with wireless camera for the development of a wall mounted wireless intrusion detection system and explain the phases by which the intrusion information are collected and sent to the central control station using wireless mesh network for analysis and processing the collected data. These days every protected zone is facing numerous security threats like trespassing or damaging of important equipment and a lot more. Unwanted intrusion has turned out to be a growing problem which has paved the way for a newer technology which detects intrusion accurately. Almost all organizations have their own conventional arrangement of protecting their zones by constructing high wall, wire fencing, power fencing or employing guard for manual observation. In case of large areas, manually observing the perimeter is not a viable option. To solve this type of problem we have developed a wall-mounted wireless fencing system. In this project I took the responsibility of studying how the different units could be collaborated and how the data collected from them could be further processed with the help of software, which was developed by me. The Intrusion detection system constitutes an important field of application for IR and microwave based wireless sensor network. A state of the art wall-mounted wireless intrusion detection system will detect intrusion automatically, through multi-level detection mechanism (IR, microwave, active RFID & camera) and will generate multi-level alert (buzzer, images, segment illumination, SMS, E-Mail) to notify security officers, owners and also illuminate the particular segment where the intrusion has happened. This system will enable the authority to quickly handle the emergency through identification of the area of incident at once and to take action quickly. IR based perimeter protection is a proven technology. However IR-based intrusion detection -system is not a full-proof solution since (1) IR may fail in foggy or dusty weather condition & hence it may generate false alarm. Therefore we amalgamate this technology with Microwave based intrusion detection which can work satisfactorily in foggy weather. Also another significant arena of our proposed system is the Camera-based intrusion detection. Some industries require this feature to capture the snap-shots of the affected location instantly as the intrusion happens. The Intrusion information data are transmitted wirelessly to the control station via multi hop routing (using active RFID or IEEE 802.15.4 protocol). The Control station will receive intrusion information at real time and analyze the data with the help of the Intrusion software. It then sends SMS to the predefined numbers of the respective authority through GSM modem attached with the control station engine.

Keywords: Communication system security; Intrusion detection; Monitoring; Software; Wireless communication; Wireless sensor networks; IEEE 802.15.4;IR Transceiver Module; Wireless Sensor Network (ID#: 15-3697)

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6921795&isnumber=6921705

Junguo Liao; Mingyan Wang, "A New Dynamic Updating Key Strategy Based On EMSA In Wireless Mesh Networks," Information and Communications Technologies (ICT 2014), 2014 International Conference on, pp.1,5, 15-17 May 2014. doi: 10.1049/cp.2014.0635 In the security protocols of Efficient Mesh Security Association(EMSA), the key updating strategy is an effective method to ensure the security of communication. For the existing strategy of periodic automatic key updating, the PTK (Pairwise Transit Key) is updated through the complex 4-way handshake to produce each time. Once the update frequency of the PTK is faster, it will have a greater impact on throughput and delay of the network. On this basis, we propose a new strategy of dynamic key updating to ensure the safety and performance of wireless mesh networks. In the new strategy, mesh point (MP) and mesh authenticator (MA) negotiate a random function at the initial certification, and use the PTK which is generated by the 4-way handshake as the initial seed. When the PTK updating cycle comes, both sides generate the new keys using the random function, which do not have to generate a new PTK by complex 4-way handshake. The analysis of performance compared with existing strategies showed that the dynamic key updating strategy proposed in this paper have a larger increase in delay and throughput of the network.

Keywords: EMSA; MESH network; key update; security protocol (ID#: 15-3698)

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6913688&isnumber=6913610

Mor, V.; Kumar, H., "Energy Efficient Techniques in Wireless Mesh Network," Engineering and Computational Sciences (RAECS), 2014 Recent Advances in, pp.1, 6, 6-8 March 2014. doi: 10.1109/RAECS.2014.6799561 Wireless Mesh Network (WMN) is a promising wireless network architecture having potential of last few miles connectivity. There has been considerable research work carried out on various issues like design, performance, security etc. in WMN. Due to increasing interest in WMN and use of smart devices with bandwidth hungry applications, WMN must be designed with objective of energy efficient communication. Goal of this paper is to summarize importance of energy efficiency in WMN. Various techniques to bring energy efficient solutions have also been reviewed.

Keywords: energy conservation; wireless mesh networks; WMN; bandwidth hungry applications; energy efficient techniques; smart devices; wireless mesh network; wireless network architecture; Energy efficiency; IEEE 802.11 Standards; Logic gates; Routing; Throughput; Wireless communication; Wireless mesh networks; energy aware techniques; energy efficient network; evolution (ID#: 15-3699)

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6799561&isnumber=6799496

Szott, S., "Selfish Insider Attacks in IEEE 802.11s Wireless Mesh Networks," Communications Magazine, IEEE, vol.52, no.6, pp.227, 233, June 2014. doi: 10.1109/MCOM.2014.6829968 The IEEE 802.11s amendment for wireless mesh networks does not provide incentives for stations to cooperate and is particularly vulnerable to selfish insider attacks in which a legitimate network participant hopes to increase its QoS at the expense of others. In this tutorial we describe various attacks that can be executed against 802.11s networks and also analyze existing attacks and identify new ones. We also discuss possible countermeasures and detection methods and attempt to quantify the threat of the attacks to determine which of the 802.11s vulnerabilities need to be secured with the highest priority.

Keywords: telecommunication security; wireless LAN; wireless mesh networks; IEEE 802.11s wireless mesh networks; selfish insider attacks; Ad hoc networks; IEEE 802.11 Standards; Logic gates; Protocols; Quality of service; Routing; Wireless mesh networks (ID#: 15-3700)

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6829968&isnumber=6829933

El Masri, A.; Sardouk, A.; Khoukhi, L.; Merghem-Boulahia, L.; Gaiti, D., "Multimedia Support in Wireless Mesh Networks Using Interval Type-2 Fuzzy Logic System," New Technologies, Mobility and Security (NTMS), 2014 6th International Conference on, pp.1,5, March 30 2014-April 2 2014. doi: 10.1109/NTMS.2014.6814034 Wireless mesh networks (WMNs) are attracting more and more real time applications. This kind of applications is constrained in terms of Quality of Service (QoS). Existing works in this area are mostly designed for mobile ad hoc networks, which, unlike WMNs, are mainly sensitive to energy and mobility. However, WMNs have their specific characteristics (e.g. static routers and heavy traffic load), which require dedicated QoS protocols. This paper proposes a novel traffic regulation scheme for multimedia support in WMNs. The proposed scheme aims to regulate the traffic sending rate according to the network state, based on the buffer evolution at mesh routers and on the priority of each traffic type. By monitoring the buffer evolution at mesh routers, our scheme is able to predict possible congestion, or QoS violation, early enough before their occurrence; each flow is then regulated according to its priority and to its QoS requirements. The idea behind the proposed scheme is to maintain lightly loaded buffers in order to minimize the queuing delays, as well as, to avoid congestion. Moreover, the regulation process is made smoothly in order to ensure the continuity of real time and interactive services. We use the interval type-2 fuzzy logic system (IT2 FLS), known by its adequacy to uncertain environments, to make suitable regulation decisions. The performance of our scheme is proved through extensive simulations in different network and traffic load scales.

Keywords: fuzzy control; protocols; quality of service; queueing theory; telecommunication congestion control; telecommunication traffic; wireless mesh networks; QoS requirements; QoS violation; buffer evolution; dedicated QoS protocols; heavy traffic load; interval type-2 fuzzy logic system; lightly loaded buffers; mesh routers; mobile ad hoc networks; multimedia support; network state; quality of service; queuing delays; regulation process; static routers; traffic load scale; traffic regulation scheme; traffic sending rate; traffic type; wireless mesh networks; Ad hoc networks; Delays ;Load management; Quality of service; Real-time systems; Throughput; Wireless communication (ID#: 15-3701)

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6814034&isnumber=6813963

Bin Hu; Gharavi, H., "Smart Grid Mesh Network Security Using Dynamic Key Distribution With Merkle Tree 4-Way Handshaking," Smart Grid, IEEE Transactions on, vol.5, no.2, pp.550,558, March 2014. doi: 10.1109/TSG.2013.2277963 Distributed mesh sensor networks provide cost-effective communications for deployment in various smart grid domains, such as home area networks (HAN), neighborhood area networks (NAN), and substation/plant-generation local area networks. This paper introduces a dynamically updating key distribution strategy to enhance mesh network security against cyber attack. The scheme has been applied to two security protocols known as simultaneous authentication of equals (SAE) and efficient mesh security association (EMSA). Since both protocols utilize 4-way handshaking, we propose a Merkle-tree based handshaking scheme, which is capable of improving the resiliency of the network in a situation where an intruder carries a denial of service attack. Finally, by developing a denial of service attack model, we can then evaluate the security of the proposed schemes against cyber attack, as well as network performance in terms of delay and overhead.

Keywords: computer network performance evaluation; computer network security; cryptographic protocols; home networks; smart power grids; substations; trees (mathematics);wireless LAN; wireless mesh networks; wireless sensor networks; EMSA; HAN;IEEE 802.11s;Merkle tree 4-way handshaking scheme; NAN; SAE; WLAN; cost-effective communications; cyber attack; denial-of-service attack model; distributed mesh sensor networks; dynamic key distribution strategy updating; efficient mesh security association; home area networks; neighborhood area networks; network performance; network resiliency improvement; plant-generation local area networks; security protocols; simultaneous authentication-of-equals; smart grid mesh network security enhancement; substation local area networks; wireless local area networks; Authentication; Computer crime; Logic gates; Mesh networks; Protocols; Smart grids; EMSA; IEEE 802.11s;SAE;security attacks; security protocols; smart grid; wireless mesh networks (ID#: 15-3702)

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6599007&isnumber=6740878

Ping Yi; Ting Zhu; Qingquan Zhang; Yue Wu; Jianhua Li, "A Denial Of Service Attack In Advanced Metering Infrastructure Network," Communications (ICC), 2014 IEEE International Conference on, pp.1029, 1034, 10-14 June 2014. doi: 10.1109/ICC.2014.6883456 Advanced Metering Infrastructure (AMI) is the core component in a smart grid that exhibits a highly complex network configuration. AMI shares information about consumption, outages, and electricity rates reliably and efficiently by bidirectional communication between smart meters and utilities. However, the numerous smart meters being connected through mesh networks open new opportunities for attackers to interfere with communications and compromise utilities assets or steal customers’ private information.  In this paper, we present a new DoS attack, called puppet attack, which can result in denial of service in AMI network. The intruder can select any normal node as a puppet node and send attack packets to this puppet node. When the puppet node receives these attack packets, this node will be controlled by the attacker and flood more packets so as to exhaust the network communication bandwidth and node energy. Simulation results show that puppet attack is a serious and packet deliver rate goes down to 20%-10%.

Keywords: power engineering computing; power system measurement; radio telemetry; security of data; smart meters; smart power grids; wireless mesh networks; DoS attack; advanced metering infrastructure network; denial of service attack; mesh network; puppet attack; smart meter; smart power grid; Computer crime; Electricity; Floods; Routing protocols; Smart meters; Wireless mesh networks (ID#: 15-3703)

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6883456&isnumber=6883277

do Carmo, Rodrigo; Hoffmann, Justus; Willert, Volker; Hollick, Matthias, "Making Active-Probing-Based Network Intrusion Detection in Wireless Multihop Networks practical: A Bayesian Inference Approach To Probe Selection," Local Computer Networks (LCN), 2014 IEEE 39th Conference on, pp.345,353, 8-11 Sept. 2014. doi: 10.1109/LCN.2014.6925790 Practical intrusion detection in Wireless Multihop Networks (WMNs) is a hard challenge. The distributed nature of the network makes centralized intrusion detection difficult, while resource constraints of the nodes and the characteristics of the wireless medium often render decentralized, node-based approaches impractical. We demonstrate that an active-probing-based network intrusion detection system (AP-NIDS) is practical for WMNs. The key contribution of this paper is to optimize the active probing process: we introduce a general Bayesian model and design a probe selection algorithm that reduces the number of probes while maximizing the insights gathered by the AP-NIDS. We validate our model by means of testbed experimentation. We integrate it to our open source AP-NIDS DogoIDS and run it in an indoor wireless mesh testbed utilizing the IEEE 802.11s protocol. For the example of a selective packet dropping attack, we develop the detection states for our Bayes model, and show its feasibility. We demonstrate that our approach does not need to execute the complete set of probes, yet we obtain good detection rates.

Keywords: Bayes methods; Equations; Intrusion detection; Probes; Spread spectrum communication; Testing; Wireless communication; Bayes inference; Intrusion Detection; Security; Wireless Multihop Networks (ID#: 15-3704)

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6925790&isnumber=6925725

Soderi, S.; Dainelli, G.; Iinatti, J.; Hamalainen, M., "Signal Fingerprinting In Cognitive Wireless Networks," Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM), 2014 9th International Conference on, pp.266,270, 2-4 June 2014. Future wireless communications are made up of different wireless technologies. In such a scenario, cognitive and cooperative principles create a promising framework for the interaction of these systems. The opportunistic behavior of cognitive radio (CR) provides an efficient use of radio spectrum and makes wireless network setup easier. However more and more frequently, CR features are exploited by malicious attacks, e.g., denial-of-service (DoS). This paper introduces active radio frequency fingerprinting (RFF) with double application scenario. CRs could encapsulate common-control-channel (CCC) information in an existing channel using active RFF and avoiding any additional or dedicated link. On the other hand, a node inside a network could use the same technique to exchange a public key during the setup of secure communication. Results indicate how the active RFF aims to a valuable technique for cognitive radio manager (CRM) framework facilitating data exchange between CRs without any dedicated channel or additional radio resource.

Keywords: cognitive radio; cryptographic protocols; public key cryptography; telecommunication security; telecommunication signalling; wireless mesh networks; CRM; DoS; RFF; active radiofrequency fingerprinting; cognitive radio manager framework; cognitive wireless networks; common-control-channel information; denial-of-service attacks; malicious attacks; public key; signal fingerprinting; Amplitude shift keying; Demodulation; Protocols; Security; Signal to noise ratio; Spread spectrum communication; Wireless communication; Cognitive; Fingerprinting; Security; Wireless (ID#: 15-3705)

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6849697&isnumber=6849647

Lichtblau, B.; Dittrich, A., "Probabilistic Breadth-First Search - A Method for Evaluation of Network-Wide Broadcast Protocols," New Technologies, Mobility and Security (NTMS), 2014 6th International Conference on, pp. 1, 6, March 30 2014-April 2 2014. doi: 10.1109/NTMS.2014.6814046 In Wireless Mesh Networks (WMNs), Network-Wide Broadcasts (NWBs) are a fundamental operation, required by routing and other mechanisms that distribute information to all nodes in the network. However, due to the characteristics of wireless communication, NWBs are generally problematic. Optimizing them thus is a prime target when improving the overall performance and dependability of WMNs. Most existing optimizations neglect the real nature of WMNs and are based on simple graph models, which provide optimistic assumptions of NWB dissemination. On the other hand, models that fully consider the complex propagation characteristics of NWBs quickly become unsolvable due to their complexity. In this paper, we present the Monte Carlo method Probabilistic Breadth-First Search (PBFS) to approximate the reachability of NWB protocols. PBFS simulates individual NWBs on graphs with probabilistic edge weights, which reflect link qualities of individual wireless links in the WMN, and estimates reachability over a configurable number of simulated runs. This approach is not only more efficient than existing ones, but further provides additional information, such as the distribution of path lengths. Furthermore, it is easily extensible to NWB schemes other than flooding. The applicability of PBFS is validated both theoretically and empirically, in the latter by comparing reachability as calculated by PBFS and measured in a real-world WMN. Validation shows that PBFS quickly converges to the theoretically correct value and approximates the behavior of real-life testbeds very well. The feasibility of PBFS to support research on NWB optimizations or higher level protocols that employ NWBs is demonstrated in two use cases.

Keywords: Monte Carlo methods; graph theory; routing protocols; search problems; wireless mesh networks; Monte Carlo method; NWB dissemination; NWB optimizations; NWB protocols; WMN; complex propagation characteristics; link qualities; network-wide broadcast protocols; network-wide broadcasts; path lengths; probabilistic breadth-first search; probabilistic edge weights; simple graph models; wireless communication; wireless links; wireless mesh networks; Approximation methods; Complexity theory; Mathematical model; Optimization; Probabilistic logic; Protocols; Wireless communication}, (ID#: 15-3706)

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6814046&isnumber=6813963

do Carmo, R.; Hollick, M., "Analyzing Active Probing For Practical Intrusion Detection in Wireless Multihop Networks," Wireless On-demand Network Systems and Services (WONS), 2014 11th Annual Conference on, pp.77,80, 2-4 April 2014. doi: 10.1109/WONS.2014.6814725 Practical intrusion detection in Wireless Multihop Networks (WMNs) is a hard challenge. It has been shown that an active-probing-based network intrusion detection system (AP-NIDS) is practical for WMNs. However, understanding its interworking with real networks is still an unexplored challenge. In this paper, we investigate this in practice. We identify the general functional parameters that can be controlled, and by means of extensive experimentation, we tune these parameters and analyze the trade-offs between them, aiming at reducing false positives, overhead, and detection time. The traces we collected help us to understand when and why the active probing fails, and let us present countermeasures to prevent it.

Keywords: frequency hop communication; security of data; wireless mesh networks; active-probing-based network intrusion detection system; wireless mesh network; wireless multihop networks; Ad hoc networks; Communication system security; Intrusion detection; Routing protocols; Testing; Wireless communication; Wireless sensor networks (ID#: 15-3708)

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6814725&isnumber=6814711

Bhatia, R.K.; Bodade, V., "Defining The Framework For Wireless-AMI Security In Smart Grid," Green Computing Communication and Electrical Engineering (ICGCCEE), 2014 International Conference on,  pp.1, 5, 6-8 March 2014. doi: 10.1109/ICGCCEE.2014.6921383 In smart grid, critical data like monitoring data, usage data, state estimation, billing data, etc. are regularly being talked among its elements. So, security of such a system, if violated, results in massive losses and damages. By compromising with security aspect of such a system is as good as committing suicide. Thus in this paper, we have proposed security mechanism in Advanced Metering Infrastructure of smart grid, formed as Mesh-Zigbee topology. This security mechanism involves PKI based Digital certificate Authentication and Intrusion detection system to protect the AMI from internal and external security attack.<

Keywords: Zigbee; computer network security; metering; power engineering computing; power system protection; public key cryptography; smart power grids; wireless mesh networks; PKI based digital certificate authentication; external security attack; internal security attack; intrusion detection system; public key infrastructure; smart grid advanced metering infrastructure; wireless AMI security; wireless mesh Zigbee network topology; Authentication; Intrusion detection; Smart grids; Smart meters; Wireless communication; Zigbee; AMI (Advanced Metering Infrastructure); PKI; Security; WMN(Wireless Mesh Network) (ID#: 15-3709)

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6921383&isnumber=6920919

de Alwis, Chamitha; Arachchi, H.Kodikara; Fernando, Anil; Pourazad, Mahsa, "Content And Network-Aware Multicast Over Wireless Networks," Heterogeneous Networking for Quality, Reliability, Security and Robustness (QShine), 2014 10th International Conference on, pp.122,128, 18-20 Aug. 2014. doi: 10.1109/QSHINE.2014.6928670 This paper proposes content and network-aware redundancy allocation algorithms for channel coding and network coding to optimally deliver data and video multicast services over error prone wireless mesh networks. Each network node allocates redundancies for channel coding and network coding taking in to account the content properties, channel bandwidth and channel status to improve the end-to-end performance of data and video multicast applications. For data multicast applications, redundancies are allocated at each network node in such a way that the total amount of redundant bits transmitted is minimised. As for video multicast applications, redundancies are allocated considering the priority of video packets such that the probability of delivering high priority video packets is increased. This not only ensures the continuous playback of a video but also increases the received video quality. Simulation results for bandwidth sensitive data multicast applications exhibit up to 10Ă— reduction of the required amount of redundant bits compared to reference schemes to achieve a 100% packet delivery ratio. Similarly, for delay sensitive video multicast applications, simulation results exhibit up to 3.5dB PSNR gains in the received video quality.

Keywords: Bandwidth; Channel coding; Delays; Network coding; Receivers; Redundancy; Streaming media; content and network-aware redundancy allocation; network coding; wireless mesh networks (ID#: 15-3710)

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6928670&isnumber=6928645

Avallone, S.; Di Stasi, G., "WiMesh: A Tool for the Performance Evaluation of Multi-Radio Wireless Mesh Networks," New Technologies, Mobility and Security (NTMS), 2014 6th International Conference on, pp.1, 5, March 30 2014-April 2 2014. doi: 10.1109/NTMS.2014.6814062 In this paper we present WiMesh, a software tool we developed during the last ten years of research conducted in the field of multi-radio wireless mesh networks. WiMesh serves two main purposes: (i) to run different algorithms for the assignment of channels, transmission rate and power to the available network radios; (ii) to automatically setup and run ns-3 simulations based on the network configuration returned by such algorithms. WiMesh basically consists of three libraries and three corresponding utilities that allow to easily conduct experiments. All such utilities accept as input an XML configuration file where a number of options can be specified. WiMesh is freely available to the research community, with the purpose of easing the development of new algorithms and the verification of their performances.

Keywords: XML; performance evaluation; telecommunication channels; telecommunication computing; wireless mesh networks; WiMesh; XML configuration; channel assignment; multiradio wireless mesh networks;ns-3 simulations; performance evaluation; research community; software tool; Channel allocation; Libraries; Network topology; Throughput; Topology; Wireless mesh networks; XML (ID#: 15-3711)

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6814062&isnumber=6813963

Arieta, F.; Barabasz, L.T.; Santos, A.; Nogueira, M., "Mitigating Flooding Attacks on Mobility in Infrastructure-Based Vehicular Networks," Latin America Transactions, IEEE (Revista IEEE America Latina), vol.12, no.3, pp.475, 483, May 2014. doi: 10.1109/TLA.2014.6827876 Infrastructure-based Vehicular Networks can be applied in different social contexts, such as health care, transportation and entertainment. They can easily take advantage of the benefices provided by wireless mesh networks (WMNs) to mobility, since WMNs essentially support technological convergence and resilience, required for the effective operation of services and applications. However, infrastructure-based vehicular networks are prone to attacks such as ARP packets flooding that compromise mobility management and users' network access. Hence, this work proposes MIRF, a secure mobility scheme based on reputation and filtering to mitigate flooding attacks on mobility management. The efficiency of the MIRF scheme has been evaluated by simulations considering urban scenarios with and without attacks. Analyses show that it significantly improves the packet delivery ratio in scenarios with attacks, mitigating their intentional negative effects, as the reduction of malicious ARP requests. Furthermore, improvements have been observed in the number of handoffs on scenarios under attacks, being faster than scenarios without the scheme.

Keywords: mobility management (mobile radio);telecommunication security; wireless mesh networks; ARP packets flooding; MIRF; WMN; filtering; flooding attacks mitigation ;handoffs; infrastructure-based vehicular networks; malicious ARP requests; mobility management; negative effects; network access; packet delivery ratio; secure mobility scheme; technological convergence; wireless mesh networks; Filtering; Floods; IP networks; Internet; Mobile radio mobility management; Monitoring; Flooding Attacks; Mobility; Security; Vehicular Networks (ID#: 15-3712)

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6827876&isnumber=6827455


Note:

Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to news@scienceofsecurity.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.