BEHAVIOR ANALYSIS OF WIRELESS MESH NETWORKS UNDER DENIAL OF SERVICES ATTACKS
Keywords:Redes Malladas Inalámbricas, seguridad, ataques, denegación de servicios
Wireless Mesh Networks (WMNs) are data networks with mesh topology, formed by nodes that establish and maintain network connectivity automatically. They are self-configuring and easily adaptable to different traffic needs and network changes. Despite these advantages, they have security vulnerabilities and are prone to different attacks, including Denial of Service (DoS) attacks. Although in Cuba this type of network is not deployed, there are several rural and urban scenarios where their application would solve economically and effectively, the lack of connectivity and access to data services. For these reasons, this work gives continuity to the study on security in wireless networks based on 802.11 standards. In this case, attacks targeting the DoS in the Data Link Layer and the Network Layer of the OSI model were analyzed. The tool used for the simulation of the scenarios was OMNET++ along with modules from the INET and NETA frameworks. The measurements were made on the throughput, the percentage of lost packets, and the changes in the network topology. The results obtained can influence important decisions in the deployment of WMNs, such as the network topology and the routing protocol used, among others.
How to Cite
The authors who publish in this journal agree to the following terms:
- The authors retain the copyright and guarantee to the journal the right to be the first publication of the work are distributed under a license of use and distribution "Creative Commons Attribution-NonCommercial-NoDerivativeWorks 3.0 Unported" (CC BY-NC-ND 3.0) You can consult from here the informative version and the legal text of the license that allows others to share the work with an acknowledgement of the authorship of the work and the initial publication in this journal.
- Authors may separately enter into additional agreements for non-exclusive distribution of the version of the work published in the journal (for example, placing it in an institutional repository or publishing it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are allowed and encouraged to disseminate their work electronically (e.g., in institutional repositories or on their own website) before and during the submission process, as this can lead to productive exchanges as well as earlier and greater citation of published work (see The Effect of Open Access).