skip to main content
10.1145/2799979.2800023acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
short-paper

Information security in computer networks with dynamic topology

Authors Info & Claims
Published:08 September 2015Publication History

ABSTRACT

This paper reviews security problems in computer networks with dynamically reconfigurable topology (e.g. mesh, MANET, computing grid, virtualized network clusters, fog computing network). The dynamically organized networks might be subjected to some specific computer attacks, which are analyzed within this paper. Different methods of security improvement are discussed, and a new method of security flaws detection based on graph modeling is suggested.

References

  1. Akyildiz, I. F., Wang, X. Wireless Mesh Networks, 2009, vol 1. John Wiley & Sons Inc, UK.Google ScholarGoogle ScholarCross RefCross Ref
  2. Xing, K., Srinivasan, S. S. R., Rivera, M., Li, J., Cheng, X. Z. 2005. "Attacks and Countermeasures in Sensor Networks: A Survey". Springer, Network Security, 534--548.Google ScholarGoogle Scholar
  3. Sen, J. 2011. Secure Routing in Wireless Mesh Networks. Wireless Mesh Networks, N. Funabiki (Ed.), 237--280. DOI= http://arxiv.org/ftp/arxiv/papers/1102/1102.1226.pdfGoogle ScholarGoogle Scholar
  4. Rupinder, K., Parminder, S. 2014. Black Hole and Greyhole Attack in Wireless Mesh Network. American Journal of Engineering Research, 41--47. DOI= http://www.ajer.org/papers/v3(10)/F031041047.pdfGoogle ScholarGoogle Scholar
  5. Chaudhry, J. A., Tariq, U., Amin, M. A., Rittenhouse, R. G. 2013. Dealing with Sinkhole Attacks in Wireless Sensor Networks. Advanced Science and Technology Letters, 7--12. DOI= http://onlinepresent.org/proceedings/vol29_2013/2.pdfGoogle ScholarGoogle Scholar
  6. Wang, X., Wong, X., Zhang, W. 2008. A heterogeneity-aware framework for group key-management in wireless mesh networks, In the Proceedings of the 4th Interntional Conference on Security and Privacy in Communication Networks (SecureComm '08), Istanbul, Turkey, September 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Zhang, Y., Fang, Y. 2006. ARSA: An Attack-Resilient Security Architecture for. Multihop Wireless Mesh Networks. IEEE Journal on Selected Areas in Communications, vol. 24. no.10, October 2006, 1916--1928. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Yi, D., Xu, G., Minqing, Z. 2011. The Research on Certificateless Hierarchical Key Management in Wireless Mesh Network. In the Proceedings Of the 3rd International Conference Communication Software and Networks (ICCSN 2011), May 27--29, 2011, Xi'an, China, 2011, 504--507.Google ScholarGoogle Scholar
  9. Oliviero, F., Romano, S. P. 2008. A Reputation-based Metric for Secure Routing in Wireless Mesh Networks. In the Proceedings of 2008 IEEE Global Communications Conference (GLOBECOM 2008), New Orleans, LO, USA, December 2008, 1--5.Google ScholarGoogle ScholarCross RefCross Ref
  10. Sanzgiri, K., LaFlamme, D., Dahill, B., Levine, B. N., Shields, C., Belding-Royer, E. M. 2005. Authenticated Routing for Ad hoc Networks. IEEE J. Select. Areas Commun., vol. 23, no. 3. 598--610. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Yi, S., Naldurg, P., Kravets, R. 2001. Security-aware ad hoc routing for wireless networks. Proceedings of ACM MobiHoc'01. 299--302 Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Zhang, Z., Naït-Abdesselam, F., Ho, P.-H., Lin, X. 2008. RADAR: A ReputAtion-Based Scheme for Detecting Anomalous Nodes in WiReless Mesh Networks. In the Proceedings of the 2008 IEEE Wireless Communications & Networking Conference (WCNC 08), Las Vegas, NV, USA, 2621--2626.Google ScholarGoogle Scholar
  13. Khan, S., Leo, K.-K., Din, K.-K. 2010. Framework for Intrusion Detection in IEEE 802.11 Wireless Mesh Networks. The International Arab Journal of Information Technology, vol. 7, no. 4, 435--440.Google ScholarGoogle Scholar
  14. Gill, R., Smith, J., Clark, A. 2006. Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks. In ACSW Frontiers '06: Proceedings of the 2006 Australian workshops on Grid Computing, Darlinghurst, Australia, 2006, 221--230. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Information security in computer networks with dynamic topology

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          SIN '15: Proceedings of the 8th International Conference on Security of Information and Networks
          September 2015
          350 pages
          ISBN:9781450334532
          DOI:10.1145/2799979

          Copyright © 2015 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 8 September 2015

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • short-paper

          Acceptance Rates

          SIN '15 Paper Acceptance Rate34of92submissions,37%Overall Acceptance Rate102of289submissions,35%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader