Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2799979.2800023acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
short-paper

Information security in computer networks with dynamic topology

Published: 08 September 2015 Publication History

Abstract

This paper reviews security problems in computer networks with dynamically reconfigurable topology (e.g. mesh, MANET, computing grid, virtualized network clusters, fog computing network). The dynamically organized networks might be subjected to some specific computer attacks, which are analyzed within this paper. Different methods of security improvement are discussed, and a new method of security flaws detection based on graph modeling is suggested.

References

[1]
Akyildiz, I. F., Wang, X. Wireless Mesh Networks, 2009, vol 1. John Wiley & Sons Inc, UK.
[2]
Xing, K., Srinivasan, S. S. R., Rivera, M., Li, J., Cheng, X. Z. 2005. "Attacks and Countermeasures in Sensor Networks: A Survey". Springer, Network Security, 534--548.
[3]
Sen, J. 2011. Secure Routing in Wireless Mesh Networks. Wireless Mesh Networks, N. Funabiki (Ed.), 237--280. DOI= http://arxiv.org/ftp/arxiv/papers/1102/1102.1226.pdf
[4]
Rupinder, K., Parminder, S. 2014. Black Hole and Greyhole Attack in Wireless Mesh Network. American Journal of Engineering Research, 41--47. DOI= http://www.ajer.org/papers/v3(10)/F031041047.pdf
[5]
Chaudhry, J. A., Tariq, U., Amin, M. A., Rittenhouse, R. G. 2013. Dealing with Sinkhole Attacks in Wireless Sensor Networks. Advanced Science and Technology Letters, 7--12. DOI= http://onlinepresent.org/proceedings/vol29_2013/2.pdf
[6]
Wang, X., Wong, X., Zhang, W. 2008. A heterogeneity-aware framework for group key-management in wireless mesh networks, In the Proceedings of the 4th Interntional Conference on Security and Privacy in Communication Networks (SecureComm '08), Istanbul, Turkey, September 2008.
[7]
Zhang, Y., Fang, Y. 2006. ARSA: An Attack-Resilient Security Architecture for. Multihop Wireless Mesh Networks. IEEE Journal on Selected Areas in Communications, vol. 24. no.10, October 2006, 1916--1928.
[8]
Yi, D., Xu, G., Minqing, Z. 2011. The Research on Certificateless Hierarchical Key Management in Wireless Mesh Network. In the Proceedings Of the 3rd International Conference Communication Software and Networks (ICCSN 2011), May 27--29, 2011, Xi'an, China, 2011, 504--507.
[9]
Oliviero, F., Romano, S. P. 2008. A Reputation-based Metric for Secure Routing in Wireless Mesh Networks. In the Proceedings of 2008 IEEE Global Communications Conference (GLOBECOM 2008), New Orleans, LO, USA, December 2008, 1--5.
[10]
Sanzgiri, K., LaFlamme, D., Dahill, B., Levine, B. N., Shields, C., Belding-Royer, E. M. 2005. Authenticated Routing for Ad hoc Networks. IEEE J. Select. Areas Commun., vol. 23, no. 3. 598--610.
[11]
Yi, S., Naldurg, P., Kravets, R. 2001. Security-aware ad hoc routing for wireless networks. Proceedings of ACM MobiHoc'01. 299--302
[12]
Zhang, Z., Naït-Abdesselam, F., Ho, P.-H., Lin, X. 2008. RADAR: A ReputAtion-Based Scheme for Detecting Anomalous Nodes in WiReless Mesh Networks. In the Proceedings of the 2008 IEEE Wireless Communications & Networking Conference (WCNC 08), Las Vegas, NV, USA, 2621--2626.
[13]
Khan, S., Leo, K.-K., Din, K.-K. 2010. Framework for Intrusion Detection in IEEE 802.11 Wireless Mesh Networks. The International Arab Journal of Information Technology, vol. 7, no. 4, 435--440.
[14]
Gill, R., Smith, J., Clark, A. 2006. Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks. In ACSW Frontiers '06: Proceedings of the 2006 Australian workshops on Grid Computing, Darlinghurst, Australia, 2006, 221--230.

Cited By

View all
  • (2023)Features of Detecting Malicious Installation Files Using Machine Learning AlgorithmsAutomatic Control and Computer Sciences10.3103/S014641162308033357:8(968-974)Online publication date: 1-Dec-2023
  • (2020)Self-Regulation of the Network Infrastructure of Cyberphysical Systems on the Basis of the Genome Assembly ProblemAutomatic Control and Computer Sciences10.3103/S014641162008035054:8(813-821)Online publication date: 1-Dec-2020
  • (2020)Ensuring the Information Security of Wireless Dynamic Networks Based on the Game-Theoretic ApproachAutomatic Control and Computer Sciences10.3103/S014641162008021054:8(937-943)Online publication date: 1-Dec-2020
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
SIN '15: Proceedings of the 8th International Conference on Security of Information and Networks
September 2015
350 pages
ISBN:9781450334532
DOI:10.1145/2799979
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 September 2015

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. adhoc
  2. dynamically organized network
  3. mesh
  4. security
  5. security node
  6. sensor network
  7. traffic statistics

Qualifiers

  • Short-paper

Funding Sources

  • Ministry of Education and Science of the Russian Federation

Conference

SIN '15

Acceptance Rates

SIN '15 Paper Acceptance Rate 34 of 92 submissions, 37%;
Overall Acceptance Rate 102 of 289 submissions, 35%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)1
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Features of Detecting Malicious Installation Files Using Machine Learning AlgorithmsAutomatic Control and Computer Sciences10.3103/S014641162308033357:8(968-974)Online publication date: 1-Dec-2023
  • (2020)Self-Regulation of the Network Infrastructure of Cyberphysical Systems on the Basis of the Genome Assembly ProblemAutomatic Control and Computer Sciences10.3103/S014641162008035054:8(813-821)Online publication date: 1-Dec-2020
  • (2020)Ensuring the Information Security of Wireless Dynamic Networks Based on the Game-Theoretic ApproachAutomatic Control and Computer Sciences10.3103/S014641162008021054:8(937-943)Online publication date: 1-Dec-2020
  • (2020)Localizing Failures with MetadataAutomatic Control and Computer Sciences10.3103/S014641162008014354:8(988-992)Online publication date: 1-Dec-2020
  • (2020)A Procedure for Improving Information System Audit Quality by Enhancing Cyberthreat Simulation in PracticeAutomatic Control and Computer Sciences10.3103/S014641162008011854:8(854-859)Online publication date: 1-Dec-2020
  • (2020)Detection of Distributed Denial of Service Attacks in Large-Scale Networks Based on Methods of Mathematical Statistics and Artificial IntelligenceAutomatic Control and Computer Sciences10.3103/S014641162008005254:8(952-957)Online publication date: 1-Dec-2020
  • (2019)Hierarchical Software-Defined Security Management for Large-Scale Dynamic NetworksAutomatic Control and Computer Sciences10.3103/S014641161808014X52:8(906-911)Online publication date: 7-Mar-2019
  • (2018)Architectures for building secure vehicular networks based on SDN technologyAutomatic Control and Computer Sciences10.3103/S014641161708012051:8(907-914)Online publication date: 1-Mar-2018
  • (2018)Security evaluation of a wireless ad-hoc network with dynamic topologyAutomatic Control and Computer Sciences10.3103/S014641161708011951:8(899-901)Online publication date: 1-Mar-2018
  • (2017)Network security architectures for VANETProceedings of the 10th International Conference on Security of Information and Networks10.1145/3136825.3136890(73-79)Online publication date: 13-Oct-2017
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media