Wireless mesh network (WMN) is the multihop emerging heterogeneous network, easily scalable and low cost. WMN architecture is the connection-oriented traffic, mobile and dynamic packet sent. Infrastructure environment easily mesh multiple forms of wireless LAN networks (WLAN), along with simultaneous transmission of multi-hop packet data from peripherals through mobile gateways to wireless tag. WMN operates as the network for access to communication technologies. This exposes WMN to numerous security challenges not only security of grid operation of transmission, but also in overall security against foreign attacks. Examined and identified security vulnerabilities in networks of broadband Internet protocol (IP), security problems in Routing layer of WMN and explored new concepts for solving security problems in WMN traffic engineering using (TE) security mechanisms resolution. Examined benefits, advantages and weakness in use of traffic engineering based on simulation results and evaluations.
Wireless Network Security
Introduction
WMN ([Akyildiz et al., 2005], [and Sichitiu June 2008], [Bruno et al., 2005] and [Chen et al., 2008]) as shown in Fig. 1 comprises mesh routers, mesh clients and mesh backbone infrastructure. mesh clients are mobile and dynamic, while mesh router is static or low mobility. These mesh routers form basic infrastructure of WMN, while mesh clients as two levels of operation of nodes: in peripheral and access points (AP).
WMN is similar in operation to mobile ad hoc network (MANET) and employs the multi-hop routing mechanism from source node to destination node. However, unlike MANET, WMN using multiple interfaces and multiple radio frequencies. It also uses high-speed network remote backup and access routes to optimize network performance and integration with other wireless networks. Mesh routers can also be the gateway to nodes in Internet cloud outside or other network technologies. These mesh routers serve as the bridge between points of network and integration with other wireless devices. AP is an interface node hosting and distribution, but provides integration between client mesh and mesh infrastructure WMN. WMN is self-configuring, self-organizing and self-healing. These qualities make WMN excellent wireless access technology for multimedia and broadband services in community (IEEE 802.16) (Johnston and Walker, 2004).
WMN is the standard IEEE 802.11s (Hiertz et al., 2007), with extensive work done by working groups in achieving the standard for its challenges and protocols. modifications and adjustments to ad hoc networks are mostly in security and WMN routing protocol. This has led to adoption of wireless local access network (WLAN, IEEE 802.11i) security access and WI-FI Protected Access (WPA) (Malekzadeh et al., 2005) for WMN. However, improvements in standardization forums have seen improvements in authentication, encryption and integrity WMN security. Moreover, like most wireless networks are mostly seen as network access providers or Internet service provider (ISP), Internet Protocol (IP) are easily configurable in achieving greater comprehensive security in WMN architecture. WMN unlike ad hoc networks are commercial properties, as is easily scalable, mobile and dynamic, but these characteristics also create security flaws in operations WMN routing and MAC layer protocol for ...