Abstract
Wireless mesh network can increase service coverage by low-cost multiple-paths between a source and a destination. But because of the wireless nature, wireless mesh network is vulnerable to diversified threats. Especially attacks by malicious nodes can decrease the performance or ravage the network. Many protocols, based on Public Key Infrastructure (PKI), have been proposed to ensure security however; these protocols cannot efficiently prevent the cases of compromised nodes. In this paper, we propose a mesh router authentication scheme to solve this problem of existing protocols. Although our scheme increases the end-to-end delay, the proposed mesh router authentication scheme can guarantee secure wireless mesh network communication from malicious nodes.
This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education, Science and Technology (R01-2008-000-20801-0).
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Akyildiz, I.F.: A Survey on Wireless mesh network, IEEE Radio Communications (September 2005)
Ben Salem, N., Hubaux, J.-P.: Securing Wireless mesh network. Wireless Communications, IEEE 13(2), 50–55 (2006)
Nandiraju, D., Santhanam, L., Nandiraju, N., Agrawal, D.P.: Achieving Load Balancing in Wireless mesh network Through Multiple gateways. In: Mobile Adhoc and Sensor Systems (MASS), October 2006, pp. 807–812 (2006)
Glass, S., Portmann, M., Muthukkumarasamy, V.: Securing Wireless mesh network. Internet Computing, IEEE 12(4), 30–36 (2008)
Johnson, D.B., Maltz, D.A.: Dynamic Source Routing in Ad Hoc Wireless Networks. Mobile Computing (1996)
Choi, S., Kim, D.-y., Lee, D.-h., Jung, J.-i.: WAP:Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks. In: 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, June 11-13, pp. 343–348 (2008)
Nandiraju, N.S., Nandiraju, D.S., Agrawal, D.P.: Multipath Routing in Wireless mesh network. In: Mobile Adhoc and Sensor Systems (MASS), October 2006, pp. 742–746 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, K.H., Hong, C.S. (2009). A PKI Based Mesh Router Authentication Scheme to Protect from Malicious Node in Wireless Mesh Network. In: Hong, C.S., Tonouchi, T., Ma, Y., Chao, CS. (eds) Management Enabling the Future Internet for Changing Business and New Computing Services. APNOMS 2009. Lecture Notes in Computer Science, vol 5787. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04492-2_41
Download citation
DOI: https://doi.org/10.1007/978-3-642-04492-2_41
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04491-5
Online ISBN: 978-3-642-04492-2
eBook Packages: Computer ScienceComputer Science (R0)