Simulation analysis on network layer attacks in wireless mesh networks

  • Authors

    • K Ganesh Reddy
    • M S. Sudheer
    • P Kiran Sree
    • V Purushothama Raju
    https://doi.org/10.14419/ijet.v7i3.29.19180
  • Use about five key words or phrases in alphabetical order, Separated by Semicolon.
  • Security mechanisms in Wireless Mesh Networks (WMNs) play an essential role to protect WMNs features. However, the existing security standards of WMNs are still in draft state. In addition to that, WMNs features like integrating with heterogeneous nodes and networks, which make designing robust security mechanism for WMNs is more complex. To develop an efficient security mechanism for WMNs, firstly we need to study the vulnerabilities of WMNs, and then exploit these vulnerabilities to perform various attacks and find the counter measures for these attacks. In this paper, we have studied various network layer attacks, based on this study we identified the interdependencies of these attacks. We use AODV protocol to exploit these attacks. Our simulation results show that the each attack severity with respect to goodput and Packet Delivery Ratio (PDR). We explained how these severity measures are useful for future WMNs security mechanisms.

     

  • References

    1. [1] I. F. Akyildiz, X. Wang, W. Wang, Wireless mesh networks: a survey, Computer networks, Elsevier 47 (4) (2005) 445-487.

      [2] J. Xie, X. Wang, A survey of mobility management in hybrid wireless mesh networks, Network, IEEE 22 (6) (2008) 34-40.

      [3] Zhang.Y, Security in Wireless Mesh Networks, CRC, 2008.

      [4] Hoang.L, Uyen.T, Secure routing in wireless sensor networks: attacks and countermeasures, Ad Hoc Networks 1 (2) (2003) 32-46.

      [5] Muhammad.S, Choong.S, Security issues in wireless mesh networks, in: IEEE/IPSJInternational Symposium on Applications and the Internet, 2009, pp. 717-722.

      [6] Ping.Y, Yue.W, A survey on security in wireless mesh networks, IETE TECHINICALREVIEW 27 (1) (2010) 6-14.

      [7] Ricardo.C, Luiz.C, Ieee 802.11s multihop mac:a tutorial, Communications Surveys and Tutorials, IEEE 13 (2010) 52-67.

      [8] H. Redwan, K.-H. Kim, Survey of security requirements, attacks and network integration in wireless mesh networks, in: New Technologies, Mobility and Security, NTMS'08, IEEE, 2008, pp. 1-5.

      [9] Sahil.S, Anil.G, Current state of art research issues and challenges in wireless mesh networks, in: IEEE Second International conference on computer Engineering and Applications, 2006, pp. 1-17.

      [10] Tamilselvan.L, Sankaranarayanan.V,Prevention of blackhole attack in manet, in: Wireless Broadband and Ultra Wideband Communications, International Conference on,Vol. 0, 2007, p. 21.

      [11] Sharma, Parveen Kumar, and Rajiv Mahajan. "A security architecture for attacks detection and authentication in wireless mesh networks." Cluster Computing 20.3 (2017): 2323-2332.

      [12] Xie, Ling Fu, and Et al. "A survey of inter-flow network coding in wireless mesh networks with unicast traffic." Computer Networks 91 (2015): 738-751.

      [13] Reddy, K. Ganesh, V. Purushothama Raju, and P. Santhi Thilagam. "An effective analysis on intrusion detection systems in wireless mesh networks." Advances in Computing, Communications and Informatics (ICACCI), 2017 International Conference on. IEEE, 2017.

      [14] Alheeti, Khattab M. Ali, Anna Gruebler, and Klaus D. McDonald-Maier. "On the detection of grey whole and rushing attacks in self-driving vehicular networks." Computer Science and Electronic Engineering Conference (CEEC), 2015 7th. IEEE, 2015.

      [15] Rathee, Geetanjali, and Hemraj Saini. "On Reduced Computational Cost, Efficient and Secure Routing (ESR) for Wireless Mesh Network." Procedia Computer Science 58 (2015): 333-341.

      [16] Karri, Ganesh Reddy, and P. Santhi Thilagam. "Reputationâ€based crossâ€layer intrusion detection system for wormhole attacks in wireless mesh networks." Security and Communication Networks 7.12 (2014): 2442-2462.

      [17] Reddy, K. Ganesh, and P. Santhi Thilagam. "Taxonomy of network layer attacks in wireless mesh network." Advances in Computer Science, Engineering & Applications. Springer, Berlin, Heidelberg, 2012. 927-935.

      [18] Reddy, K. Ganesh, and P. Santhi Thilagam. "MAC layer security issues in wireless mesh networks." AIP Conference Proceedings. Vol. 1715. No. 1. AIP Publishing, 2016.

      [19] Reddy, K. Ganesh, P. Santhi Thilagam, and Bommena Nageswara Rao. "Cross-layer IDS for rushing attack in wireless mesh networks." Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology. ACM, 2012.

  • Downloads

  • How to Cite

    Ganesh Reddy, K., S. Sudheer, M., Kiran Sree, P., & Purushothama Raju, V. (2018). Simulation analysis on network layer attacks in wireless mesh networks. International Journal of Engineering & Technology, 7(3.29), 301-303. https://doi.org/10.14419/ijet.v7i3.29.19180