6th International Virtual Congress (IVC-2019) And Workshop.  International E-publication: Publish Projects, Dissertation, Theses, Books, Souvenir, Conference Proceeding with ISBN.  International E-Bulletin: Information/News regarding: Academics and Research

Performance Analysis of Secure Wireless Mesh Networks

Author Affiliations

  • 1 Institute of Computer Science, Vikram University, Ujjain - INDIA

Res. J. Recent Sci., Volume 1, Issue (3), Pages 80-85, March,2 (2012)


Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks, and it is going to address the internet provision to user at low cost anytime from anywhere. WMN is characterized by dynamic self-organization, self-configuration and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services. Security of such a network has always been an issue. In this paper, we have analyzed the fundamental security requirements of WMN and the challenges faced by it. We have also discussed the vulnerable features and possible active threats in WMN along with few defense mechanisms against such threats, including solutions to the problems of intrusion detection. This paper serves a baseline for developing a secured, full-proof WMN.


  1. Akyildiz I.F., Wang X. and Wang W., Wireless mesh networks: a survey, Comp Net, 47(4), 445-87 (2005)
  2. Camp J. and Knightly E., The IEEE 802.11s extended service set mesh networking standard, IEEE Communicat Magaz, 46(8), 120-6 (2008)
  3. Muhammad S. Siddiqui and Choong Seon Hong, Security Issues in Wireless Mesh Networks, IEEE International Conference on Multimedia and Ubiquitous Engineering (2007)
  4. Zhang W., Wang Z., Das S.K. and Hassan M., Security Issues in Wireless Mesh Networks, In Book Wireless Mesh Networks: Architectures and protocols, New York, Springer(2008)
  5. Rivest R.L., Shamir A. and Adleman L.M., A Method for Obtaining Digital Signatures and Public- Key Cryptosystems, Comms of the ACM, 21(2), 120-126 (1978)
  6. Steve Glass, Marius Portmann and Vallipuram, securing wireless mesh networks, IEEE computer society-1098-7801-2008
  7. IEEE0 7.Hu Y.C., Perrig A. and Johnson D.B., Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols, Proc. 2003 ACM Workshop on Wireless Security, ACM Press, 30–40 (2003)
  8. Aydos M., Tanık T., Koç C.K., High-Speed Implementation of an ECC-based Wireless Authentication Protocol on an ARM Microprocessor, IEE Pro.: Comms, 273-279 (2001)
  9. Diffie W., Hellman M., New Directions in Cryptography, IEEE Trans., on IT, 644-654 (1976)
  10. Yih-Chun Hu, Adrian Perrig and David B. Johnson, Efficient Security Mechanisms for Routing Protocols. In Proceedings of the 2003 Symposium on Network and Distributed Systems Security (NDSS ’03) (2003)
  11. Zhang Y., Lee W. and Huang Y., Intrusion Detection Techniques for Mobile Wireless Networks in ACM/Kluwer Wireless Networks Journal (ACM WINET), 9(5), (2003)
  12. Marti S., Giuli T., Lai K. and Baker M., Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, in proceeding of the Sixth Annual International Conference on Mobile Computing and Networking (MOBICOM), Boston, 255-265 (2000)
  13. Albers P., Camp O., Percher J., Jouga B., L.M., and Puttini R., Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches in the proceedings of 1st Int. Workshop on Wireless Information Systems (WIS-2002) , 1-12 (2002)