We also provide an exact solution based on dynamic programming to solve the optimal routing problem in WMNs. BMR adopts a newly developed routing metric called Multi-Level Routing metric (MLR) to efficiently utilize the advantages of both multi-radio/multi-channel WMNs and cross-layer design. ![]() The major component of CLEAR is a new bio-inspired routing protocol called Birds’ Migration Routing protocol (BMR). This framework embodies optimal as well as heuristic solutions. In this paper, a cross-layer based routing framework for multi-interface/multi-channel WMNs, called Cross-Layer Enhanced and Adaptive Routing (CLEAR), is proposed. Routing protocols play a crucial role in the functionality and the performance of WMNs due to their direct effect on network throughput, connectivity, supported Quality of Service (QoS) levels, etc. The distinguishing features and the wide range of WMNs’ applications have attracted both academic and industrial communities. Wireless Mesh Networks (WMNs) provide a new and promising solution for broadband Internet services. A number of open problems in security and privacy issues for WMNs are subsequently discussed before the chapter is finally concluded. The chapter then presents a brief discussion on various trust management approaches for WMNs since trust and reputation-based schemes are increasingly becoming popular for enforcing security in wireless networks. Comparative analyses are also presented on the security schemes with regards to the cryptographic schemes used, key management strategies deployed, use of any trusted third party, computation and communication overhead involved etc. After enumerating various possible attacks, the chapter provides a detailed discussion on various existing security mechanisms and protocols to defend against and wherever possible prevent the possible attacks. Furthermore, various possible attacks on the key management protocols, user authentication and access control protocols, and user privacy preservation protocols are presented. First, it identifies the security vulnerabilities in the physical, link, network, transport, application layers. Keeping in mind the critical requirement of security and user privacy in Wireless Mesh Networks (WMNs), this chapter provides a comprehensive overview of various possible attacks on different layers of the communication protocol stack for WMNs and their corresponding defence mechanisms.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |