Monday, December 3, 2018

Security in Wireless Mesh Networks


Introduction
            A wireless mesh network popularly abbreviated as WMN is a mesh network that is created through the connection of several access points that are installed at each locale of the network user. In this case, each of the network users is also a provider where it does so by forwarding data from one node to the next. There is decentralization and simplification of the networking infrastructure since each of the nodes is required to transmit as far as the next node. Wireless mesh networking could give the people living in the remote areas and small business operators in rural neighborhood the capability to connect their networks together for the Internet connections that they could afford (Akyildiz & Wang, 2009).

            The architecture of wireless mesh networks is the first step towards providing the users with cost-effective and dynamic high-bandwidth networks over a certain area of coverage. A wireless mesh network infrastructure is a composition of network of routers without the cabling between the nodes. The infrastructure is build up peer radio devices that are not cabled to a wired port similar to the WLAN access points. Wireless mesh network infrastructure transmits data over large distances through splitting of the distance into several short hops. Besides the intermediate nodes boosting the signal, the also cooperatively pass data from one point to another by making forwarding decisions based on the knowledge of the network they have. This type of architecture may provide high bandwidth, spectral efficiency, and various economic benefits over the area of coverage.
            The management of wireless mesh networks can either happen at a central point or it can be decentralized. However, both managements are cheap, reliable, and resilient because the transmission between the node and the next node. The nodes in this network act as routers whereby they transmit data from only the nearby nodes to the far away peers and they reach in a single hop. The result is the network that spans large distances. Wireless mesh networks may be applied either in fixed or mobile devices. Their solutions are as diverse as the needs of the communication. Wireless mesh networks may be used in hostile environment such as emergency situations, oil rigs, tunnels, battlefield surveillance, and real-time racing car telemetry among others (Avula, Lee, & Yoo, 2014).
            The emergence of wireless mesh networks is perceived as the solution to the next generation wireless communication networks due to its ability to provide flexible, adaptive, and reconfigurable architecture. Additionally, it offers cost-effective business network solutions to the service providers. As the wireless mesh networks become the most popular among the wireless networking technologies, it is imperative to design secure communication protocols for the networks. However, the loopholes that result from the broadcast nature of transmission in the wireless medium lead to security vulnerabilities that external and an internal attacker could exploit. I will take part in the identification and defending of these attacks in a network service provider company. This is a critical requirement for the networks in a bid to have sustained networks services that satisfies the quality of services of the user applications. Additionally, there are cases of compromise of the user privacy. Therefore, protecting the privacy of the user will also be among the critical requirements that our team at the organization will be dealing with (Choi & Han, 2010).


Methodology
            Action research (AR) is a research model that is made up of the process of learning and acting on what one has learned. AR involves carrying out a series of inquiry on the matters related to the field of research. The action researchers associate with experts in the process of data and information collection to improve the societal or business activities that require improvements. AR focuses on having a comprehensive understanding of the practices and the situation at hand within the organization or the society. Besides the mentioned features of AR, it has other specific attributes that differentiate it from other traditional research models (Cochrane-Smith & Lytle, 1993).
            One of the attributes through which AR is differentiated from traditional models of research is that it introduces the practitioner to the real-life practices. The other attribute of AR is the collaborative nature of the researchers or the researchers and the participants throughout the process. The participants and the researchers collaborate actively where the participants learn ways of handling issues either in the organization or the society. Besides that, AR also includes the wide acquisition of knowledge. The researcher and participants acquire new knowledge by learning new insights, ideas, skills, and experience to conduct the research and develop new inventions within the process that are linked to the environment in which they are conducting AR. AR also helps the practitioners to act on the findings of the process. The practitioners can implement the change by acting on the findings and the data collected during the process. This is essentially the function of AR without which it would not be AR but another model of traditional research (Hollingsworth, 1997).

History of AR
            AR as a methodology of inquiry was an invention of Kurt Lewin, German social psychologist based in the United States in 1946. Kurt Lewin described AR as a series of continuous steps that follow iterative spiral actions. The iterative spiral actions are made up of four main phases of planning, action, observation, and reflection of the outcomes of the action. The last phases are validation and evaluation stages. According to the studies, AR evolved since its first mention by Kurt Lewin in 1946. Furthermore, same studies show that all the other models of scientific methods in the education fields borrow heavily from AR. However, the original principles as invented by Kurt Lewin are still useful in shaping the modern AR in finding solutions to the societal or organizational problems. It would have been unwise if modern AR and scientific methods had gone against the original definition of AR (Hoepfl, 1997).
Suitability of AR
            AR helps in developing ideas for the solution of the organizational or societal problems enabled by the thorough process it undergoes. AR supports societal, and organization changes by upgrading the systems and way of doing things. Therefore, AR is the most suitable methodology for improving the security in the wireless mesh networks. The researcher will gather information needed in achieving what he would like to the end of the process. Furthermore, the AR will enable the implementation of the security at the wireless mesh networks to proceed through the four phases of AR of planning, action, observation, and reflection. Therefore, the researcher will have split the tasks in the process into manageable tasks thereby allowing comprehensive inquiry into the process of security implementation in wireless mesh networks (Pedretti, 1997).

References
Akyildiz, I. F., & Wang, X. (2009). Wireless mesh networks. Hoboken: Wiley & Sons        Publishers.
Avula, M., Lee, S.-G., & Yoo, S.-M. (2014). Security framework for hybrid wireless mesh            protocol in wireless mesh networks. KSII Transactions on Internet and Information        Systems (TIIS), 8 (6), 1982-2004.
Choi, H.-g., & Han, S.-j. (2010). Domain load balancing routing for multi-gateway wireless          mesh networks. Wireless Networks: The Journal of Mobile Communication,             Computation, and Information, 16 (8), 2105-2122.
Cochrane-Smith, M., & Lytle, S. (1993). Inside/outside: Teacher research and knowledge. New    York: Teachers College Press.
Hoepfl, M. C. (1997). Choosing qualitative research: A primer for technology education researchers. Journal of Technology Education, 9 (1), 47-63.
Hollingsworth, S. (1997). International action research: A case book for educational reform.         London: Falmer Press.
Pedretti, E. (1997). Septic tank crisis: A case study of science, technology, and social education   in elementary school. International Journal of Science Education, 19 (10), 1211-1230.


Sherry Roberts is the author of this paper. A senior editor at MeldaResearch.Com in article critique writing service if you need a similar paper you can place your order for top research paper writing companies.


No comments:

Post a Comment