Skip to main content

Adaptive Algorithms to Enhance Routing and Security for Wireless PAN Mesh Networks

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4277))

Abstract

Wireless PAN Mesh Network (WMN) is currently going to be standardized and enhanced to take full advantages of the flexible and heterogeneous networks. Although the standard (802.15.5) is under-construction, WMNs are expected to become popular as they have the ability to connect all kinds of current networks. So far, there is no applied architecture which is efficient enough to completely solve routing and security problems in WMN. To assist IEEE P805.15 in routing and security aspects, in this paper, we propose an adaptive algorithm for detecting bogus nodes when they attempt to intrude into the network by attacking routing protocol. In addition, a procedure to find the most optimal path between two nodes is presented along with adaptive pre-conditions for WMNs. We also show that our algorithm is robust according to the mobility of the nodes and it is easy to implement in currently proposed architectures. It can work with many kinds of wireless networks as well as can reduce computational costs.

An erratum to this chapter can be found at http://dx.doi.org/10.1007/11915034_125.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. IEEE 802.15-15-05-0247-00-0005, Mesh PAN Alliance (MPA), IEEE 802.15.5 Working Group for Wireless Personal Area Networks

    Google Scholar 

  2. IEEE 802.15.5-05-0260-00-0005, IEEE 802.15.5 WPAN Mesh Network, IEEE 802.15.5 Working Group for Wireless Personal Area Networks

    Google Scholar 

  3. Guan, Y., Ghorbani, A.B.: A clustering method for intrusion detection. In: Proceedings of Canadian Conference on Electrical and Computer Engineering, Canada, pp. 1083–1086 (2003)

    Google Scholar 

  4. Basagni, S.: Distributed Clustering in Ad Hoc Networks. In: Proceedings of the 1999 Intl. Symp. on Parallel Architectures, Algorithms and Networks (I-SPAN 1999), Freemantle, Australia (1999)

    Google Scholar 

  5. Sterne, D.: A General Cooperative Intrusion Detection Architecture for MANETs. In: Proceeding of the Third IEEE International Workshop on Information Assurance (IWIA 2005), IEEE, Los Alamitos (2005)

    Google Scholar 

  6. Huang, Y.-a., Lee, W.: A Cooperative Intrusion Detection System for Ad Hoc Networks. In: 2003 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2003), George W. Johnson Center at George Mason University, USA, October 31 (2003)

    Google Scholar 

  7. Karpijoki, V.: Security in Ad Hoc Networks, http://citeseer.nj.nec.com/karpijoki01security.html

  8. Brutch, P., Ko, C.: Challenges in Intrusion Detection for Ad Hoc Network. In: IEEE Workshop on Security and Assurance in Ad hoc Networks, Orlando, FL, January 28 (2003)

    Google Scholar 

  9. Wrona, K.: Distributed Security: Ad Hoc Networks & Beyond. In: PAMPAS Workshop, London, September 16/17 (2002)

    Google Scholar 

  10. Theoleyre, F., Valois, F.: A Virtual Structure for Hybrid Networks. In: IEEE Wireless Communications and Networking Conference (WCNC 2004), Atlanta, USA (March 2004)

    Google Scholar 

  11. Krishna, P., Vaidya, N.H., Chatterjee, M., Pradhan, D.K.: A cluster-based approach for routing in dynamic networks. ACM SIGCOMM Computer Communication Review (1997)

    Google Scholar 

  12. Huang, M.-Y., Jasper, R.J., Wicks, T.M.: A large scale distributed intrusion detection framework based on attack strategy analysis. Computer Networks, 2465–2475 (1999)

    Google Scholar 

  13. Ryan, J., Lin, M.-J., Milikkulainen, R.: Intrusion Detection with Neural Networks. In: Advances in Neural Information Processing Systems. Proceedings of NIPS 1997, Denver, CO, vol. 10, MIT Press, Cambridge (1998)

    Google Scholar 

  14. Ilgun, K., Kemmerer, R.A., Porras, P.: State transition analysis: A rule-based intrusion detection approach. IEEE Trans. on Software Engineering, 181–199 (1995)

    Google Scholar 

  15. Porras, P.A., Neumann, P.G.: Emerald, Event monitoring enabling responses to anomalous live disturbances. In: Proc. of 20th NIST-NCSC Nat’l. Info. Systems Security Conf., pp. 353–365 (1997)

    Google Scholar 

  16. Zheng, J., Lee, M.J., Anshel, M.: Towards Secure Low Rate Wireless Personal Area Networks. IEEE Transactions on mobile computing

    Google Scholar 

  17. Zhang, Y., Lee, W.: Intrusion Detection in Wireless Ad Hoc Networks. In: Proceedings of The Sixth International Conference on Mobile Computing and Networking (MobiCom 2000), Boston, MA (August 2000)

    Google Scholar 

  18. Perkins, C.E., Belding-Royer, E.M., Das, S.: Ad Hoc On Demand Distance Vector (AODV) Routing. IETF RFC 3561

    Google Scholar 

  19. Perkins, C.E., Royer, E.M.: The ad hoc on-demand distance-vector protocol. In: Perkins, C.E. (ed.) Ad Hoc Networking, Addison-Wesley, Reading (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hieu, C.T., Dai, T.T., Hong, C.S., Lee, JJ. (2006). Adaptive Algorithms to Enhance Routing and Security for Wireless PAN Mesh Networks. In: Meersman, R., Tari, Z., Herrero, P. (eds) On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops. OTM 2006. Lecture Notes in Computer Science, vol 4277. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11915034_82

Download citation

  • DOI: https://doi.org/10.1007/11915034_82

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-48269-7

  • Online ISBN: 978-3-540-48272-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics