Skip to main content

A Secure Hybrid Wireless Mesh Protocol for 802.11s Mesh Network

  • Conference paper
Computational Science and Its Applications – ICCSA 2008 (ICCSA 2008)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 5072))

Included in the following conference series:

Abstract

Wireless Mesh Network (WMN) has emerged as a key technology and found a great deal of interest for the researchers in the recent past. Hybrid Wireless Mesh Protocol (HWMP) is the default path selection (i.e., routing) protocol fully specified in the current draft D.1.06 of 802.11s for WMN. However, security in routing or forwarding functionality is not specified in the standard. As a consequence, HWMP in its current from is vulnerable to various types of routing attacks. In this paper, we propose a secure version of HWMP (SHWMP) that operates similarly to that of HWMP but uses cryptographic extensions to provide authenticity and integrity of routing messages and prevents unauthorized manipulation of mutable fields in the routing information elements. We have shown through analyses and simulation that SHWMP is robust against identified attacks and provides higher packet delivery ratio and incurs little computational and storage overhead to ensure security.

This work was supported by the Korea Research Foundation Grant funded by the Korean Government (MOEHRD)" (KRF-2006-521-D00394).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akyildiz, I.F., Wang, X., Wang, W.: Wireless mesh networks: a survey. Computer Networks 47(4) (March 2005)

    Google Scholar 

  2. IEEE 802.11s Task Group, Draft Amendment to Standard for Information Technology Telecommunications and Information Exchange Between Systems – LAN/MAN Specific Requirements – Part 11: Wireless Medium Access Control (MAC) and physical layer (PHY) specifications: Amendment: ESS Mesh Networking, IEEE P802.11s/D1.06 (July 2007)

    Google Scholar 

  3. Wang, X., Lim, A.O.: IEEE 802.11s wireless mesh networks: Framework and Challenges. AdHoc Networks, 1–15 (2007) doi:10.1016/j.adhoc.2007.09.003

    Google Scholar 

  4. Merkle, R.C.: A certified digital signature (subtitle: That antique paper from 1979). In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)

    Google Scholar 

  5. Bahr, M.: Proposed Routing for IEEE 802.11s WLAN Mesh Networks. In: 2nd Annual International Wireless Internet Conference (WICON), Boston, MA, USA (August 2006)

    Google Scholar 

  6. Bahr, M.: Update on the Hybrid Wireless Mesh protocol of 802.11s. In: Proc. of IEEE International Conference on Mobile Adhoc and Sensor Systems, MASS 2007, pp. 1–6 (2007)

    Google Scholar 

  7. Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. In: Proc. MobiCom 2002, Atlanta, GA, September 23–28 (2002)

    Google Scholar 

  8. Perrig, A., Canetti, R., Tygar, J.D., Song, D.: Efficient authentication and signing of multicast streams over lossy channels. In: Proc. of IEEE Symposium on Security and Privacy, pp. 56–73 (2000)

    Google Scholar 

  9. Gergely, L.B., Vajda, I.: Provably secure on-demand routing in Mobile Adhoc Networks. IEEE transactions on Mobile Computingm 5(11), 1533–1546 (2006)

    Article  Google Scholar 

  10. Zapata, M.G., Asokan, N.: Securing Adhoc rouring protocols. In: Proc. of ACM Workshop of Wireless Security (Wise), September 2002, pp. 1–10 (2002)

    Google Scholar 

  11. Sangiri, K., Dahil, B.: A Secure Routing Protocol for Ad Hoc Networks. In: Proc. of 10th IEEE International Conference on Network Protocols (ICNP 2002) (2002)

    Google Scholar 

  12. The Network Simulator – ns-2, http://www.isi.edu/nsnam/ns/index.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Osvaldo Gervasi Beniamino Murgante Antonio Laganà David Taniar Youngsong Mun Marina L. Gavrilova

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Islam, M.S., Yoon, Y.J., Hamid, M.A., Hong, C.S. (2008). A Secure Hybrid Wireless Mesh Protocol for 802.11s Mesh Network. In: Gervasi, O., Murgante, B., Laganà, A., Taniar, D., Mun, Y., Gavrilova, M.L. (eds) Computational Science and Its Applications – ICCSA 2008. ICCSA 2008. Lecture Notes in Computer Science, vol 5072. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69839-5_74

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-69839-5_74

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69838-8

  • Online ISBN: 978-3-540-69839-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics