z-logo
Premium
Deployment and validation of out of band IP traceback approach (OBTA) in wireless mesh network
Author(s) -
Gassara Mouna,
Bouabidi Imen,
Zarai Faouzi,
Obaidat Mohammad S.,
Hsiao KueiFang
Publication year - 2018
Publication title -
international journal of communication systems
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.344
H-Index - 49
eISSN - 1099-1131
pISSN - 1074-5351
DOI - 10.1002/dac.3580
Subject(s) - ip traceback , computer science , denial of service attack , computer network , network packet , ip address spoofing , wireless mesh network , spoofing attack , signaling protocol , computer security , wireless , internet protocol , wireless network , the internet , telecommunications , quality of service , network address translation , world wide web
Summary Wireless mesh networks (WMNs) have acquired recently enormous attention and momentum; therefore, security aspects have been a fundamental concern for them. Among catastrophic threats on WMNs, Denial‐of‐Service attacks that have become a severe danger because of their plug‐and‐play structural design. Unfortunately, preventing a Denial‐of‐Service attack presents a challenging issue. This fact is induced with the appearance of the source IP addresses spoofing. The resolution key of this issue is to reveal the attack source based on the path through which the attack packet passes. For this, many researchers in IP traceability field propose various methods and techniques to deal with the issue. In this article, we conceive a novel approach named out of band IP traceback approach in WMN (IEEE 802.11s). We create a new architecture using signaling messages for discovering the real source(s) of IP packets. Our solution is based on a security‐oriented signaling protocol. This protocol allows specialized signaling entities to communicate via reliable signaling information. This fact permits us to perform a simple and efficient traceback. In our novel approach, we use 2 radios: the first one transmits normal data packets whereas the second is reserved to exchange IP traceback information. The performance of the proposed scheme is analyzed via simulation analysis using the Network Simulator 3. The simulation results show that our scheme is efficient in dealing with the traceback problem in WMN environments.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here