|
|
ImmunityBased Security Model for Wireless Mesh Networks |
YI Ping1,2,WU Yue1,ZOU Futai1,LIU Ning1,CHEN Jialin1 |
(1. School of Information Security Engineering, Shanghai Jiaotong University, Shanghai 200240, China; 2. Key Laboratory of Child Development and Learning Science of Ministry of Education, Southeast University, Nanjing 210096, China) |
|
|
Abstract A wireless Mesh networks is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration. The flexibility in space and time induces new challenges towards the security infrastructure. Contrary to their wired counterpart, wireless Mesh networks do not have a clear line of defense, and every node must be prepared for encounters with an adversary. Therefore, a centralized or hierarchical network security solution does not work well. This paper provided a scalable, distributed security model for wireless Mesh networks. The model integrates the ideas of immune system and a multiAgent architecture. Compared with traditional security system, the proposed security model is designed to be distributed, of autonomy, adaptability, and scalability. In the end, the model was illustrated by an example and simulation.
|
Received: 24 February 2009
Published: 26 February 2010
|
|
|
|
|
[1] |
YANG Bin,LU Yuliang,YANG Guozheng,ZHU Kailong. An Artificial Immune Network Classification Algorithm Based on VirtualForce Direction and Cell Differentiation[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2017, 51(1): 98-. |
[2] |
WEN Zhicheng1,2,CHEN Zhigang1,DENG Xiaoheng1,LIU Anfeng1. Network Security Situation Awareness Method Based on Multi-Source and Multi-Level Information Fusion[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2015, 49(08): 1144-1152. |
[3] |
XU Bo,MIN Huaqing,XIAO Fangxiong. Ant Colony Algorithm for Solving Discrete Minimum Constraint Removal (MCR) Problem[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2015, 49(03): 383-386. |
[4] |
WANG Xin1,JIA Qingxuan1,GAO Xin1,CHEN Gang1,ZHAO Bing2. Adaptive N Tree Anti-Collision Algorithm Based on Bitmap Construction[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2015, 49(02): 150-157. |
[5] |
ZHANG Keli1,LI Zhongxian1,2,YANG Yixian1. A Trust Model for Identifying and Tracing Malicious Anonymous Feedback Providers[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2014, 48(07): 899-906. |
[6] |
ZHANG Ying,JI Changgang,LI Junfu. A Routing Algorithm Based on Energy and Distance for Heterogeneous Sensor Networks with Multilevel Energies[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2014, 48(07): 953-958. |
[7] |
CHEN Jianhong1,2,SHAN Jingsong1,YANG Ronggen1,GONG Lejun1,CHEN Kefei 2,YU Kun1,CHEN Liqing1,SUN Chengfu1. Identity-based Threshold Key-insulated Signature Without Random Oracles
[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2013, 47(08): 1239-1245. |
[8] |
XIE Jing, LIU Gong-Shen, SU Bo, MENG Kui. Prediction of User’s Retweet Behavior in Social Network[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2013, 47(04): 583-588. |
[9] |
LIU Chen-Yan-1, 2 , PAN Li-1, 2 , ZI Xiao-Chao-2. A Binary-String-Set-Based Algebraic Framework for Policy Composition[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2013, 47(04): 579-583. |
[10] |
QIAO Yu-Ran, WU Nan, YANG Qian-Ming, WEN Mei, ZHANG Chun-Yuan. Deadlock Detection and Recovery Based on Topological Order for NoC[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2013, 47(01): 92-97. |
[11] |
CHEN Gui-Rong-1, 2 , CAI Wan-Dong-1, XU Hui-Jie-1, YAN Pei-Xiang-3, WANG Jian-Ping-1. High-Effect Priority Bounded Confidence Model for Network Opinion Evolution[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2013, 47(01): 155-160. |
[12] |
FANG Ming-1, CHEN Song-Qiao-1, WANG Ke-Fei-2. High Radix Router Design Based on Asymmetric Crossbar[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2013, 47(01): 138-143. |
[13] |
ZHOU Gui-Yin, HE Chen, JIANG Ling-Ge. Single Transceiver and Network Characteristics Based
MAC Protocol for Cognitive Radio Wireless Sensor Networks[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2012, 46(11): 1729-1735. |
[14] |
XIAO Rong, JIANG Ling-Ge, HE Chen. A Channel Reliability Based Multi-channel MAC Protocol in Wireless Sensor Networks[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2012, 46(09): 1382-1386. |
[15] |
LIU Su-Na-1, 2 , PAN Li-1, 2 , 3 , YAO Li-Hong-2. BLP Based Access Control Mechanism in Multi-level Network Systems[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2012, 46(09): 1387-1391. |
|
|
|
|