Selfish Insider Attacks in IEEEs Wireless Mesh Networks[omnet++program]

Selfish Insider Attacks in IEEEs Wireless Mesh Networks

Wireless mesh networks WMNs are a potentially important technology for providing Internetaccess in the near future. This can be attributed to the continuous increase in wireless transmission speeds and the declining cost of devices. Selfish Insider Attacks in IEEEs Wireless Mesh Networks Selfish Insider Attacks in IEEEs Wireless Mesh Networks[omnet++program]The IEEE supports these developments through the constant evolution of the standard. One of its latest amendments,s, is specifically targeted at WMNs and provides the necessary wireless multihop functionality to Wi-Fi devices. WMNs face multiple security challenges, Selfish Insider Attacks in IEEEs Wireless Mesh Networks including susceptibility to selfish noncooperative behavior.

Selfish attacks are performed by insiders stations that have already been authenticated and are a legitimate part of the network, with a goal of directly or indirectly increasing their quality of service QoS by abusing network mechanisms.1 This is in contrast to malicious attacks that aim at destabilizing network performance. Malicious attacks have beenwell studied, Selfish Insider Attacks in IEEEs Wireless Mesh Networks whereas selfish attacks are an emerging threat for WMNs for several reasons Equipment vendors may attempt to illegitimately increase the performance of their devices .

Selfish Insider Attacks in IEEEs Wireless Mesh Networks

 

There is a trend toward ensuring the flexibility of wireless card drivers , Selfish Insider Attacks in IEEEs Wireless Mesh Networks which paves the way for nonstandard and noncooperative behavior. Although s provides authentication and encryption to protect the network fromexternal attacks, it is still susceptible toinsider attacks, especially of a selfish nature. Community networks are especially prone to such attacks because mesh stations can be selfishly configured by their users to raise the QoS e.g. increase throughput or decrease delay of all traffic flows terminating in their homes. The research area of selfish attacks has been well explored for wireless infrastructure and ad hoc network topologies. However, mesh networks, Selfish Insider Attacks in IEEEs Wireless Mesh Networks while sharing many similarities with such topologies, Selfish Insider Attacks in IEEEs Wireless Mesh Networks also possess several distinct characteristics.

Selfish Insider Attacks in IEEEs Wireless Mesh Networks In principle, they are more structured than ad hoc networks and can support more complex protocols. This is reflected in the amendment, which has not yet been analyzed from an insider attack perspective. Existing related security analyses have focused on genericmesh network topologies or considered only malicious insider attacks causing network disruption. This tutorial is the first work that focuses on s to examine its key characteristics and identify exploits subject to selfish attacks. Additionally, this tutorial aims to foster discussion on insider security in s and other network types susceptible to selfish attacks.The contributions of this tutorial are as follows. In the following section we cover the basic functionality ofs that is required to understand the nature of the selfish attacks. We then discuss attacks against the various mechanisms of s in the third section. We consider attacks known from the literature, hitherto analyzed for ad hoc networks, and show how they can be executed ins networks. Furthermore, we identify new attacks inherent tos. In the fourth section, we provide an analysis of countermeasure methods to prevent selfish insider attacks. The main outcome of the article is the comparative study of the attacks presented in the fifth section. We conclude the article with the sixth section, where we outline future research directions. The hybrid wireless mesh protocol HWMP is responsible for routing traffic in s and is referred to therein as a path selection protocol because it specifies only the PHY and MAC layers. HWMP operates on MAC instead of IP addresses but is not functionally different from  routing protocol. Because HWMP shares similar security threats as network layer routing protocols.