当前位置: X-MOL 学术Int. J. Inf. Technol. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
An optimal strategy to countermeasure the impersonation attack in wireless mesh network
International Journal of Information Technology Pub Date : 2021-05-02 , DOI: 10.1007/s41870-021-00680-4
Regan Rajendran , J. Martin leo manickam

A group of mobile nodes that dynamically create a short-term network called an wireless mesh network. In which the nodes are proficient in communicating with other node without the help of any central administrator or a network infrastructure. Since the wireless mesh network shows the characteristics like open medium, dynamic topology and distributed cooperation, the network is so weak against security attacks. The security attacks in routing may upset the successful communication and cause partly or wholly blocked network. Thus, the security has become a vital apprehension to achieve a successful and proper communication between mobile nodes in wireless mesh network. Impersonation is a security attack in which the attacker tries to modify the topology of the network or separate any certified node from the network by using the identity of a certified node in the network. In the proposed system, the Unique Secret Code (USC) is used to avoid impersonation and the corresponding node is kept separated from the network.



中文翻译:

无线网状网络中模拟攻击的最佳对策

一组可动态创建称为无线网状网络的短期网络的移动节点。在这些节点中,无需任何中央管理员或网络基础结构即可熟练地与其他节点进行通信。由于无线网状网络具有开放媒体,动态拓扑和分布式协作等特征,因此该网络抵抗安全攻击的能力很弱。路由中的安全攻击可能会破坏成功的通信,并导致部分或完全阻塞网络。因此,安全性已经成为在无线网状网络中实现移动节点之间的成功且适当的通信的重要考虑。模拟是一种安全攻击,攻击者尝试使用网络中经过认证的节点的身份来修改网络的拓扑或将任何经过认证的节点从网络中分离出来。在提出的系统中,使用唯一密码(USC)来避免假冒,并且相应的节点与网络保持隔离。

更新日期:2021-05-03
down
wechat
bug