Mitigação de Ataques de Inundação para Redes em Malha sem Fio usando Reputação e Filtering

  • Flávio Arieta UFPR
  • Larissa Barabasz UFPR
  • Michele Nogueira UFPR

Abstract


Wireless mesh networks (WMNs) have being applied in different social contexts, such as health care, transportation and entertainment. These networks support tecnological convergence and resilience, required for the effective operation of those aplications. However, WMNs are prone to attacks that compromise mobility management and network access. This work proposes MIRF, a security scheme based on reputation and filtering to mitigate flooding attacks on mobility management of wireless mesh networks. The efficiency of the MIRF scheme has been evaluated by simulations considering scenarios with and without attacks. Analyses show that it significantly improves the packet delivery ratio in scenarios with attacks, mitigating their intentional negative effects, as the reduction of malicious ARP requests. Furthermore, improvements have been observed in the number of handoffs on scenarios under attacks, being faster than scenarios without the scheme.

References

The Network Simulator NS-2. http://www.isi.edu/nsnam/ns/. [Online; Julho 2013].

Akyildiz, I., Wang, X., and Wang, W. (2005). Wireless mesh networks: a survey. Computer Networks, 47:445–487.

Bahr, M. (2006). Proposed Routing for IEEE 802.11s WLAN Mesh Networks. In Proceedings of the ACM Annual International Wireless Internet Conference, pages 6–1. ACM.

Barabasz, L. and Nogueira, M. (2011). Uma Avaliação de Segurança no Gerenciamento de Mobilidade nas Redes em Malha sem Fio. Anais do XI Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais, pages 329–338.

Boukerche, A. and Zhang, Z. (2008). A hybrid-routing based intra-domain mobility management scheme for wireless mesh networks. In Proceedings of the 11th international symposium on Modeling analysis and simulation of wireless and mobile systems, MSWiM ’08, pages 268–275. ACM.

Egners, A. and Meyer, U. (2010). Wireless mesh network security: State of affairs. IEEE 35th Conference on Local Computer Networks (LCN), pages 997–1004.

Martignon, F., Paris, S., and Capone, A. (2008). Mobisec: a novel security architecture for wireless mesh networks. Proceedings of the 4th ACM symposium on QoS and security for wireless and mobile networks, pages 35–42.

Mehdi, S., Ghazi, A., Badii, J., Djamal, Z., and Hossam, A. (2007). Mobile party: A mobility management solution for wireless mesh network. IEEE International Conference on Wireless and Mobile Computing, Networking and Communication, page 45.

Selvaraj, C. and Anand, S. (2012). A survey on Security Issues of Reputation Management Systems for Peer-to-Peer Networks. Computer Science Review, 6(4):145–160.

Sen, J. (2012). Secure and Privacy-Preserving Authentication Protocols for Wireless Mesh Networks. Clinical Orthopaedics and Related Research (CORR).

the Standards for Wireless LAN, T. W. G. S. IEEE 802.11. http://www.ieee802.org/11/. [Online; Março 2013].

Xie, J. and Wang, X. (2008). A survey of mobility management in hybrid wireless mesh networks. IEEE Network, 22:34–40.
Published
2013-11-11
ARIETA, Flávio; BARABASZ, Larissa; NOGUEIRA, Michele. Mitigação de Ataques de Inundação para Redes em Malha sem Fio usando Reputação e Filtering. In: BRAZILIAN SYMPOSIUM ON CYBERSECURITY (SBSEG), 13. , 2013, Manaus. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2013 . p. 142-155. DOI: https://doi.org/10.5753/sbseg.2013.19542.

Most read articles by the same author(s)

1 2 3 > >>