Abstract
Wireless mesh networks (WMN) provide fine solutions for commercial, personal and corporate purposes since it has the features of self-configuration, instantly deployable, low-cost. Mesh network utilizes the open medium property of Wireless channel, has a fixed topology, the limited network size and thus it is prone to attacks. Wireless network security protocols are easily prone to attacks such as brute-force attacks in case of wired equivalent privacy (WEP) and to some extent Wi-Fi Protected Access (WPA) as well. we are designing a layered encryption technique referred to as Onion that will make it more secure against global adversary attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Reed, M.G., Syverson, P.F., Goldschlag, D.M.: Anonymous Communication and Onion Routing. IEEE Journal on Selected Areas in Communication Special Issue on Copyright and Privacy Protection (1998)
Routing Information Protocol, RFC, http://www.faqs.org/rfcs/rfc1058.html
OPSF Version 2, RFC, http://www.faqs.org/rfcs/rfc2328.html
Tor: “An anonymous Internet communication system” = http://tor.eff.org
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second- Generation Onion Router. In: 13th USENIX Security Symposium (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kakade, S., Sawant, R., Karia, D.C. (2013). Privacy Issues in Single and Multi–hop Wireless Mesh Network. In: Thampi, S.M., Atrey, P.K., Fan, CI., Perez, G.M. (eds) Security in Computing and Communications. SSCC 2013. Communications in Computer and Information Science, vol 377. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40576-1_38
Download citation
DOI: https://doi.org/10.1007/978-3-642-40576-1_38
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40575-4
Online ISBN: 978-3-642-40576-1
eBook Packages: Computer ScienceComputer Science (R0)