Home > Research > Publications & Outputs > Towards resilient community wireless mesh networks

Electronic data

Links

Text available via DOI:

View graph of relations

Towards resilient community wireless mesh networks

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published
Publication date07/2008
Host publicationAIMS '08 Proceedings of the 2nd International Conference on Autonomous Infrastructure, Management and Security: Resilient Networks and Services
PublisherSpringer-Verlag
Pages195-199
Number of pages5
ISBN (print)978-3-540-70586-4
<mark>Original language</mark>English
EventSecond International Conference on Autonomous Infrastructure, Management and Security (AIMS 2008) - Bremen, Germany
Duration: 1/07/20083/07/2008

Conference

ConferenceSecond International Conference on Autonomous Infrastructure, Management and Security (AIMS 2008)
CityBremen, Germany
Period1/07/083/07/08

Publication series

NameLecture Notes in Computer Science

Conference

ConferenceSecond International Conference on Autonomous Infrastructure, Management and Security (AIMS 2008)
CityBremen, Germany
Period1/07/083/07/08

Abstract

Wireless Mesh Networks are an increasingly common technology providing connectivity in many communities, particularly where Internet access is unavailable or restricted via more conventional means. Their comparative ease of installation and relatively low cost makes this especially true for communities which might previously have lacked the technical knowledge or skill to attempt such an endeavour. In such a situation it is important that the operation of the network should be easily manageable; to this end the overall resiliency of the network is a key factor, enabling the network to resolve and remediate problems as they arise without requiring external technical understanding or input. This research aims to improve the resilience of community mesh networks by improving their security, initially examining the use of risk analysis techniques in this environment to identify potential attack vectors. This understanding will then be used to investigate intrusion detection techniques for operation specifically in a community environment.

Bibliographic note

networkresilience; wraybroadbandproject