期刊文献+

无线mesh网络安全研究

A survey of wireless mesh networks security
下载PDF
导出
摘要 无线mesh网络(wireless mesh networks,WMN)是下一代网络中的新型技术,和传统网络不同,它不依赖任何固定的设施,主机可以相互依赖保持网络连接,WISP可以利用它提供快速、简单、低廉的网络部署,然而存在一个主要的问题是容易遭受攻击。介绍了无线mesh网络的体系机构以及特点,分析并研究其存在的安全性威胁以及现有的关键安全解决机制。 Wireless mesh network (WMN) is a new type of next generation network technology. Unlike any traditional networks, it doesnt rely on any fixed infrastructure, and its hosts can rely on each other to keep the network connected. Wireless Internet service providers can use it to provide fast, easy and inexpensive network deployment. However, one main challenge in design of these networks is their vulnerability to security attacks. This paper introduces the architecture and the characteristics of wireless mesh network, and analyzes the threat to the safety and the key security mechanisms.
作者 刘源
出处 《数字通信》 2009年第5期88-91,共4页 Digital Communications and Networks
关键词 无线MESH网络 安全路由 安全认证 wireless mesh networks (WMN) secure routing secure authentication
  • 相关文献

参考文献12

  • 1ZHANG W,WANG Z S,DAS K,et al. Security Issues in Wireless Mesh Networks, In Book Wireless Mesh Networks : Architectures and protocols [ EB/OL ]. ( 2008-02- 18) [2009-05-21 ]. http: // www. baisi, net/thread- 242252-1-1. html.
  • 2SALEM N B, ALEN, HUBAUX J P. Securing Wireless Mesh Networks [ EB/OL ]. ( 2006-05-15 ) [ 2009-05-23 ].http : Jj ieeexplore, ieee. org/xpls/abs_all, jsp? arnumber = 1632480.
  • 3ZHANG Yan, LUO Ji-jun, HU Hong-lin. Wireless Mesh Networking: Architectures, Protocols and Stands [ EB/ OL]. (2006-12-31) [ 2009-05-23 ]. http: //www. infibeam. com/Books/info/Yan-Zhang/Wireless-Mcsh-Networking-Architectures-Protocols-and-Standards/ 0849373999. html.
  • 4吴越,孙皓,张树彬.下一代网络中的无线网络安全关键技术研究[J].信息网络安全,2007(5):12-14. 被引量:8
  • 5MATT B. Computer Security : Art and Science [ EB/OL ]. (003-02-14) [ 2009-05-23]. http://www, amazon, corn/ Computer-Security-Science-Matt-Bishop/dp/0201440997.
  • 6童天浩,易平,邢泓凯,等.无线MESH网络的安全性问题[EB/OL].(2007-07-20)[2009-05-23].http://isoshu.cqvip.com/qk/96116A/200903/29660340.html.
  • 7BUCHEGGERS, LE B J Y. Nodes bearing grudges:towards routing security [ EB/OL ]. (2002-01-11 ) [ 2009- 05-23 ]. http: //ieeexplore. ieee. org/xpls/abs_all, jsp? arnumber = 994321 .
  • 8RAMACHANDRAN K N,AMACHANDRAN M,BUDDHIK,et al. On the design and impementation of infrastructure mesh networks [ EB/OL ]. ( 2006-05-01 ) [ 2009- 07-23 ]. http://www, newsmth, net/pc/pcarch, php? userid = summer1227&y = 2006&m = 4.
  • 9HVANG C T,COODA M G. Hop Integrity in the Internet [ EB/OL]. ( 2005-08-13 ) [ 2009-07-21 ]. http: //www. es. utexas, edu/- gouda/research, htm.
  • 10刘东升,杨亚涛.无线Mesh网络中多服务器的门限认证系统构建[J].中山大学学报(自然科学版),2008,47(6):100-103. 被引量:2

二级参考文献10

  • 1FACCIN S M, WIJTING C, KNECKT J, et al. Mesh WLAN networks: concept and system design [ J]. IEEE Wireless Communications, 2006, 13(2) : 10 - 16.
  • 2SIDDIQUI M S, HONG C S. Security issues in wireless Mesh networks [C]//The Proceedings of 2007 International Conference on Multimedia and Ubiquitous Engi- neering ( MUE07 ), IEEE Computer Society, 2007 : 717 - 722.
  • 3PRASAD A R. Securing Mesh networks-A novel solution for home scenario[C]//The Proceedings of 2nd International Conference on Communication Systems Software and Middleware ( COMSWARE 2007 ), IEEE Computer Society, 2007 : 1 - 5.
  • 4SAMHAT A E, ABDI M. Security and AAA architecture for WiFi - WiMAX Mesh network [ C ]//The Proceedings of 4th International Symposium on Wireless Communication Systems ( ISWCS 2007), Society, 2007:587 - 591.
  • 5ROOS A, WIELAND S, SCHWARZBACHER A Th, et al. Time behaviour and network encumbrance due to authentication in wireless mesh access networks[ C]//The Proceedings of IEEE 65th Vehicular Technology Conference (VTC2007), IEEE Press, 2007:1219 - 1223.
  • 6DESMEDT Y, FRANKEL Y. Threshold cryptosystem [ C]//The Proceeding of CRYPTO89, LNCS 435, Berlin : Springer - Verlag, 1990 : 307 - 315.
  • 7SHAMIR A. How to share a secret [ J ]. Communications of the ACM, 1979, 24( 11 ) :612 -613.
  • 8ASMUTH C A, BLOOM J. A modular approach to key safeguarding [ J ]. IEEE Transactions on Information Theory, 1983, 29(2) :208 -210.
  • 9KAYA K, SELCUK A A. Threshold cryptography based on Asmuth- Bloom secret sharing [ J ]. Information Sciences, 2007,177(19) : 4148 -4158.
  • 10ZHAO J J, ZHANG J Z, ZHAO R. A practical verifiable multi-secret sharing scheme [ J ]. Computer Standards & Interfaces, 2007, 29( 1 ) : 138 - 141.

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部