咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >An optimal strategy to counter... 收藏

An optimal strategy to countermeasure the impersonation attack in wireless mesh network

作     者:Rajendran, Regan Martin leo manickam, J. 

作者机构:Department of Computer Science and Engineering University College of Engineering Villupuram Villupuram India Department of Electronics and Communication Engineering St. Joseph’s College of Engineering Chennai India 

出 版 物:《International Journal of Information Technology (Singapore)》 (Int. J. Inf. Technol.)

年 卷 期:2021年第13卷第3期

页      面:1033-1038页

主  题:Malicious node Public key authentication Security Unique Secret Code Wireless mesh network 

摘      要:A group of mobile nodes that dynamically create a short-term network called an wireless mesh network. In which the nodes are proficient in communicating with other node without the help of any central administrator or a network infrastructure. Since the wireless mesh network shows the characteristics like open medium, dynamic topology and distributed cooperation, the network is so weak against security attacks. The security attacks in routing may upset the successful communication and cause partly or wholly blocked network. Thus, the security has become a vital apprehension to achieve a successful and proper communication between mobile nodes in wireless mesh network. Impersonation is a security attack in which the attacker tries to modify the topology of the network or separate any certified node from the network by using the identity of a certified node in the network. In the proposed system, the Unique Secret Code (USC) is used to avoid impersonation and the corresponding node is kept separated from the network. © 2021, Bharati Vidyapeeth s Institute of Computer Applications and Management.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分