DIFFERENT SECURITY MECHANISMS FOR DIFFERENT TYPE OF SECURITY LAPSES IN WMN- A REVIEW
Journal Title: Indian Journal of Computer Science and Engineering - Year 2012, Vol 3, Issue 1
Abstract
The wireless mesh network(WMN) is a wide network over globe . It is a multi-hop network which is made of static as well as the Mobile nodes which are connected with each other via special node called routers and Backbone gateways. As the infrastructure of WMN is large and it is multi-hop . It is difficult to provide security easily at different communications links. WMN is made up of many type communication media such as wired such as co-axial cable to optical fiber and Wireless Media such as low length WI-FI to high range and capacity Wimax. So it is heterogonous in nature. Due to heterogeneity, security lapses are much more over WMN. There my be several type of attacks which affects the data unlawfully. There are many security mechanisms are deployed which according to transmission media provide adequate security and make WMN a safe network for data transmission. We discussed threats and there possible solution using security mechanisms This paper serves a baseline for developing a secured, full-proof WMN which takes care of all types of attacks.
Authors and Affiliations
Narender Singh , Kuldeep Vats , Jasvinder , Lovish Jaiswal
NOVEL SCHEME FOR THE REMOVAL OF BLOTCHES, BLACK BAND NOISE, STREAKS AND IMPULSE NOISE IN GRAY SCALE IMAGES
A Threshold based fixed 3x3 Non linear filter for the removal of image artifact such as blotches, black band noise, streaks and impulse is proposed. The algorithm detects the corrupted pixel, if the absolute difference b...
FAULT TOLERANCE USING CREDENTIALS MANAGEMENT IN ONLINE TRANSACTION APPLICATION
Web applications play a vital role in the IT field for satisfying the web customer. The customer always depends on the online transaction processing system. The web application has various forms which gives a complete se...
A SURVEY REPORT ON VPN SECURITY & ITS TECHNOLOGIES
Virtual Private Network (VPN) is a communication network which provides secure data transmission in an unsecured or public network by using any combination of technologies. A virtual connection is made across the users w...
VARIABLE RATE STEGANOGRAPH Y IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS
In this paper three image steganography methods with variable rate of embedding are proposed. In the first method, called two neighbor method the two neighboring pixels such as upper and left are exploited to take embedd...
A REVIEW PAPER ON CRYPTOGRAPHIC APPROACH FOR LICENSE MANAGEMENT SYSTEM IN CLOUD COMPUTING
Computational world is become very large and complex. Cloud computing has emerged as a popular computing model to support on demand services. It has inherited the legacy technology and adding new ideas. The goal of cloud...