Wireless Mesh Networks 2011
DOI: 10.5772/13468
|View full text |Cite
|
Sign up to set email alerts
|

Secure Routing in Wireless Mesh Networks

Abstract: Physical layer attacksThe physical layer is responsible for frequency selection, carrier frequency generation, signal detection, modulation, and data encryption. As with any radio-based medium, the possibility of jamming attacks in this layer of WMNs is always there. Jamming is a type of attack which interferes with the radio frequencies that the nodes use in a WMN for communication (Shi et al., 2004). A jamming source may be powerful enough to disrupt communication in the entire network. Even with less powerf… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
18
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 20 publications
(18 citation statements)
references
References 66 publications
(133 reference statements)
0
18
0
Order By: Relevance
“…By a blackhole attack, a malicious node will advertise itself as having the best route to the destination even though it does not have a route to it. It does this by sending a route reply packet immediately to the source node . The source node, upon receiving this malicious route reply, assumes that the route discovery is complete and ignores all other route reply packets from the other nodes and selects the path that now includes the malicious node as a relay node to forward the data packets.…”
Section: System Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…By a blackhole attack, a malicious node will advertise itself as having the best route to the destination even though it does not have a route to it. It does this by sending a route reply packet immediately to the source node . The source node, upon receiving this malicious route reply, assumes that the route discovery is complete and ignores all other route reply packets from the other nodes and selects the path that now includes the malicious node as a relay node to forward the data packets.…”
Section: System Modelmentioning
confidence: 99%
“…Instead of dropping all the traffic, the node drops the packets selectively that makes grayhole attacks more difficult to detect as the selective packet dropping may be perceived as packet loss because of the unreliable wireless channels in the networks. Hence, the grayhole attacks may go undetected for a longer period of time than the blackhole attacks . Furthermore, the grayhole nodes may appear well‐behaved during the route discovery process or at the starting of data transmission.…”
Section: System Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…An attacker node does not transmit traffic and data does not reach a recipient and gets lost [3]. There is a subtype of that attack called «grayhole»: not all of the sent packets are transmitted [4].…”
Section: Introductionmentioning
confidence: 99%
“…The enhanced secure routing protocol for wireless mesh networks (E‐SRPM) uses information of previous unsuccessful communications with neighboring nodes as one of the parameters for selecting routes. Two secure WMN routing protocols were proposed by Sen . The first protocol relies on estimated reliability of routing paths by collecting information regarding the wireless links to one‐hop neighbor nodes, whereas the second is a trust‐based protocol that uses local observations for detecting selfish nodes.…”
Section: Introductionmentioning
confidence: 99%