Reference Hub4
Wireless Mesh Network Security, Architecture, and Protocols

Wireless Mesh Network Security, Architecture, and Protocols

Sachin Kumar Gupta, Aabid Rashid Wani, Santosh Kumar, Ashutosh Srivastava, Diwankshi Sharma
Copyright: © 2020 |Pages: 27
ISBN13: 9781799803737|ISBN10: 1799803732|ISBN13 Softcover: 9781799803744|EISBN13: 9781799803751
DOI: 10.4018/978-1-7998-0373-7.ch001
Cite Chapter Cite Chapter

MLA

Gupta, Sachin Kumar, et al. "Wireless Mesh Network Security, Architecture, and Protocols." Security and Privacy Issues in Sensor Networks and IoT, edited by Priyanka Ahlawat and Mayank Dave, IGI Global, 2020, pp. 1-27. https://doi.org/10.4018/978-1-7998-0373-7.ch001

APA

Gupta, S. K., Wani, A. R., Kumar, S., Srivastava, A., & Sharma, D. (2020). Wireless Mesh Network Security, Architecture, and Protocols. In P. Ahlawat & M. Dave (Eds.), Security and Privacy Issues in Sensor Networks and IoT (pp. 1-27). IGI Global. https://doi.org/10.4018/978-1-7998-0373-7.ch001

Chicago

Gupta, Sachin Kumar, et al. "Wireless Mesh Network Security, Architecture, and Protocols." In Security and Privacy Issues in Sensor Networks and IoT, edited by Priyanka Ahlawat and Mayank Dave, 1-27. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-7998-0373-7.ch001

Export Reference

Mendeley
Favorite

Abstract

Due to suppression of central administration in WMN, network functioning like network controls, management, routing, switching, packet forwarding etc. are distributed among nodes, either collectively or individually. So, cooperation among nodes is highly solicited. However, there may exist node's malicious activities because of its open characteristics and limited available battery power. The nodes may misbehave by refusing to provide service or dropping down the packets because of its selfishness and malicious activity. The identification of misbehaving nodes and prevention from them can be one of the biggest challenges. Hence, the prime target of the chapter is to provide an overview of existing intrusion detection and prevention approaches, and secure routing or framework that can recognize and prevent from the malicious activities. The digital signature-based IDS to offer secure acknowledgment and an authentication mechanism has also been discussed. The expectation is the digital signature-based IDS will overcome the weakness of existing IDS.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.