Cybersecurity mesh is a distributed architectural approach to scalable, flexible and reliable cybersecurity control. Many assets now exist outside of the traditional security perimeter. Cybersecurity mesh essentially allows for the security perimeter to be defined around the identity of a person or thing. It enables a more modular, responsive security approach by centralizing policy orchestration and distributing policy enforcement. As perimeter protection becomes less meaningful, the security approach of a “walled city” must evolve to current needs.
Wireless mesh networks function as regular wireless networks, but with significant differences. Mesh networks decentralize the infrastructure required to maintain a network by making each node, or computer, pull double-duty as a user and a router of Internet traffic. This way, the network exists as an organic and self-managed entity capable of servicing a varying number of users. People joining or using wireless mesh networks for business purposes should be aware, however, that this interface isn’t without security problems.
Wireless mesh network (WMN) is a new wireless networking paradigm. Unlike traditional wireless networks, WMNs do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. Wireless Internet service providers are choosing WMNs to offer Internet connectivity, as it allows a fast, easy and inexpensive network deployment. One main challenge in design of these networks is their vulnerability to security attacks. In this paper, we investigate the principal security issues for WMNs. We study the threats a WMN faces and the security goals to be achieved. We identify the new challenges and opportunities posed by this new networking environment and explore approaches to secure its communication.