무선 메쉬 네트워크의 보안 위협 및 공격 분석

  • Published : 2012.07.31

Abstract

본고에서는 적용의 유연성과 비용 효율의 장점으로 다양한 커뮤니티 네트워크 기술로 고려되는 무선 메쉬 네트워크(WMN: Wireless Mesh Networks)에서 고려해야 하는 보안 위협을 다룬다. 특히, WMN를 구성하는 무선 전송 계층과 인터넷 (IP) 계층에서 발생할 수 있는 보안 취약점과 공격의 예를 기술한다.

Keywords

References

  1. A. Acharya, A. Misra, S. Bansal, "High-penormance architectures for IF-based multihop 802.11 networks," IEEE Wireless Communications V.10(5), 2003, PP. 22-28.
  2. L F. Akyildiz, X. Wang, W. Wang, "Wireless mesh networks: a survey," Computer Networks V.47(4), 2005, PP. 445 - 487. https://doi.org/10.1016/j.comnet.2004.12.001
  3. IETF MANET WG, "Mobile Ad-hoc Networks," (http://datatracker.ietf. org/wg/manet/)
  4. IEEE Standard 802.11s, "Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications Amendment 10: Mesh Networking," (http:// standards.ieee.org/ findstds/ standard/ 802 .11s-2011. html)
  5. N. B. Salem, J. Hubaux, "Securing Wireless Mesh Networks," IEEE Wireless Communications, v.13(2), 2006. pp.50-55.
  6. Z. Bankovic, et. al., "Improving security in WMNs with reputation systems and self-organizing maps," Elsevier, Journal of Network and Computer Applications, v.34, 2011, PP. 455-463. https://doi.org/10.1016/j.jnca.2010.03.023
  7. P. Gupta, P. Rawat, S. Malik, S. Gupta, "Securing WMN using Honeypot Technique," Int. Journal on computer Science and Engineering, v. 4(2), 2012. PP. 235-238.
  8. S. Khan, N. A. Alrajeh, K. Loo, "Secure route selection in wireless mesh networks," Elsevier, Computer Networks, v. 56, 2012, PP. 491-503. https://doi.org/10.1016/j.comnet.2011.07.005
  9. R. Lacuesta, J. Lloret, M. Garcia, L. Penalver, "Two secure and energy-saving spontaneous adhoc protocol for wireless mesh networks," Elsevier, Journal of Network and Computer Applications, v. 34, 2011, PP. 492-505. https://doi.org/10.1016/j.jnca.2010.03.024
  10. N. Kang, Y. Kim, J. Kwak, "H2O: Hierarchically Optimized Hybrid Routing Strategies for Multihop Wireless Networks," Conference Proceeding of ICOIN, 2007. PP. 771-780.
  11. S. Glass, M. Portmann, V. Muthukkumarasamy, "Securing Wireless Mesh Networks," IEEE Internet Computing - Special Issue on Mesh Networking, July/ August 2008, pp 30- 36.
  12. B. Wu, J. Chen, J. Wu, M. Cardei, "A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks," Wireless/Mobile Network Security chapter 12, Springer 2006.
  13. 오민석, "Security Challenges and solutions in WMN," 한국정보보호학회논문지, 10권 2호, 2012년 2월
  14. M. Lin, S. Chem, "Security Challenges in Wireless Mesh Networks Deployment and User Authentication (EAP) Methods," Elsevier Energy Procedia v. 13, 2011, PP. 8875-8882. https://doi.org/10.1016/S1876-6102(14)00454-8
  15. M. S. Siddiqui, C. S. Hong, "Security Issues in Wireless Mesh Networks," IEEE Int. Com. Proceeding of MUE 2007.
  16. S. Glass, M. Portmann, V. Muthukkumarasamy. "Securing Wireless Mesh Networks", IEEE Internet Computing - Special Issue on Mesh Networking, July/ August 2008, pp 30- 36.