ABSTRACT
This paper reviews security problems in computer networks with dynamically reconfigurable topology (e.g. mesh, MANET, computing grid, virtualized network clusters, fog computing network). The dynamically organized networks might be subjected to some specific computer attacks, which are analyzed within this paper. Different methods of security improvement are discussed, and a new method of security flaws detection based on graph modeling is suggested.
- Akyildiz, I. F., Wang, X. Wireless Mesh Networks, 2009, vol 1. John Wiley & Sons Inc, UK.Google ScholarCross Ref
- Xing, K., Srinivasan, S. S. R., Rivera, M., Li, J., Cheng, X. Z. 2005. "Attacks and Countermeasures in Sensor Networks: A Survey". Springer, Network Security, 534--548.Google Scholar
- Sen, J. 2011. Secure Routing in Wireless Mesh Networks. Wireless Mesh Networks, N. Funabiki (Ed.), 237--280. DOI= http://arxiv.org/ftp/arxiv/papers/1102/1102.1226.pdfGoogle Scholar
- Rupinder, K., Parminder, S. 2014. Black Hole and Greyhole Attack in Wireless Mesh Network. American Journal of Engineering Research, 41--47. DOI= http://www.ajer.org/papers/v3(10)/F031041047.pdfGoogle Scholar
- Chaudhry, J. A., Tariq, U., Amin, M. A., Rittenhouse, R. G. 2013. Dealing with Sinkhole Attacks in Wireless Sensor Networks. Advanced Science and Technology Letters, 7--12. DOI= http://onlinepresent.org/proceedings/vol29_2013/2.pdfGoogle Scholar
- Wang, X., Wong, X., Zhang, W. 2008. A heterogeneity-aware framework for group key-management in wireless mesh networks, In the Proceedings of the 4th Interntional Conference on Security and Privacy in Communication Networks (SecureComm '08), Istanbul, Turkey, September 2008. Google ScholarDigital Library
- Zhang, Y., Fang, Y. 2006. ARSA: An Attack-Resilient Security Architecture for. Multihop Wireless Mesh Networks. IEEE Journal on Selected Areas in Communications, vol. 24. no.10, October 2006, 1916--1928. Google ScholarDigital Library
- Yi, D., Xu, G., Minqing, Z. 2011. The Research on Certificateless Hierarchical Key Management in Wireless Mesh Network. In the Proceedings Of the 3rd International Conference Communication Software and Networks (ICCSN 2011), May 27--29, 2011, Xi'an, China, 2011, 504--507.Google Scholar
- Oliviero, F., Romano, S. P. 2008. A Reputation-based Metric for Secure Routing in Wireless Mesh Networks. In the Proceedings of 2008 IEEE Global Communications Conference (GLOBECOM 2008), New Orleans, LO, USA, December 2008, 1--5.Google ScholarCross Ref
- Sanzgiri, K., LaFlamme, D., Dahill, B., Levine, B. N., Shields, C., Belding-Royer, E. M. 2005. Authenticated Routing for Ad hoc Networks. IEEE J. Select. Areas Commun., vol. 23, no. 3. 598--610. Google ScholarDigital Library
- Yi, S., Naldurg, P., Kravets, R. 2001. Security-aware ad hoc routing for wireless networks. Proceedings of ACM MobiHoc'01. 299--302 Google ScholarDigital Library
- Zhang, Z., Naït-Abdesselam, F., Ho, P.-H., Lin, X. 2008. RADAR: A ReputAtion-Based Scheme for Detecting Anomalous Nodes in WiReless Mesh Networks. In the Proceedings of the 2008 IEEE Wireless Communications & Networking Conference (WCNC 08), Las Vegas, NV, USA, 2621--2626.Google Scholar
- Khan, S., Leo, K.-K., Din, K.-K. 2010. Framework for Intrusion Detection in IEEE 802.11 Wireless Mesh Networks. The International Arab Journal of Information Technology, vol. 7, no. 4, 435--440.Google Scholar
- Gill, R., Smith, J., Clark, A. 2006. Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks. In ACSW Frontiers '06: Proceedings of the 2006 Australian workshops on Grid Computing, Darlinghurst, Australia, 2006, 221--230. Google ScholarDigital Library
Index Terms
- Information security in computer networks with dynamic topology
Recommendations
Security of Software Defined Networks
Software Defined Networking (SDN) has emerged as a new network architecture for dealing with network dynamics through software-enabled control. While SDN is promoting many new network applications, security has become an important concern. This paper ...
Security Labs for Software Defined Networks in CloudLab
SIGCSE '19: Proceedings of the 50th ACM Technical Symposium on Computer Science EducationSoftware-Defined Networking (SDN) has been changing inflexible networks in software-based programmable networks for more flexibility, scalability, and visibility into networking. At the same time, it brings many new security challenges, but there are ...
Security and trust management in opportunistic networks: a survey
As a new networking paradigm, opportunistic networking communications have great vision in animal migration tracking, mobile social networking, network communications in remote areas and intelligent transportation, and so on. Opportunistic networks are ...
Comments