2014
DOI: 10.1002/sec.1176
|View full text |Cite
|
Sign up to set email alerts
|

Joint anti-attack scheme for channel assignment in multi-radio multi-channel wireless mesh networks

Abstract: Nowadays, multi-radio multi-channel wireless mesh networks have been widely exploited to provide high-speed Internet access. By assigning different channels, the interference between wireless mesh network nodes can be greatly reduced, leading to a better network performance. However, the channel assignment attacks have imposed a serious security problem, where the diverse messages, that is, Channel Usage Message (CUM), Channel Change Message (CCM), Channel Switch Operation (CSO) and Security Alarm Message (SAM… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
26
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(26 citation statements)
references
References 35 publications
0
26
0
Order By: Relevance
“…In , the possibilities of malicious assigner have discussed and in , some attacks were applied by the neighboring nodes. Additionally, the reliability of the assigner, the assignee, and the neighbor nodes has been challenged in . (ii) There is no verification in the most CA procedure at all.…”
Section: Attacks and Vulnerabilities Against Ca Algorithmsmentioning
confidence: 99%
See 4 more Smart Citations
“…In , the possibilities of malicious assigner have discussed and in , some attacks were applied by the neighboring nodes. Additionally, the reliability of the assigner, the assignee, and the neighbor nodes has been challenged in . (ii) There is no verification in the most CA procedure at all.…”
Section: Attacks and Vulnerabilities Against Ca Algorithmsmentioning
confidence: 99%
“…The malicious node M lies about expected loads in channels 1 and 2 to newcomer nodes of G and D. Consequently, they choose these overloaded channels. This attack not only leads to improper channel decision, but it also deprives the victim node of regular data forwarding . Some schemes are designed to assign the channels after sensing considerable changes in measured values such as signal‐to‐interference‐plus‐noise ratio, traffic load, and link availability to name a few.…”
Section: Attacks and Vulnerabilities Against Ca Algorithmsmentioning
confidence: 99%
See 3 more Smart Citations