Abstract
In recent years, mesh networking has emerged as a key technology for the last mile Internet access and found to be an important area of research and deployment. The current draft standard of IEEE 802.11s has defined routing for Wireless Mesh Networks (WMNs) in layer-2 and is termed as Hybrid Wireless Mesh Protocol (HWMP). However, security in routing or forwarding functionality is not specified in the standard. As a consequence, HWMP in its current from is vulnerable to various types of routing attacks such as flooding, route disruption and diversion, spoofing etc. In this paper, we propose SHWMP, a secure HWMP protocol for WMN. The proposed protocol uses cryptographic extensions to provide authenticity and integrity of HWMP routing messages and prevents unauthorized manipulation of mutable fields in the routing information elements. We show via analysis that the proposed SHWMP successfully thwarts all the identified attacks. Through extensive ns-2 simulations, we show that SHWMP provides higher packet delivery ratio with little increase in end-to-end delay, path acquisition delay and control byte overhead.
“This research was supported by the MKE, Korea, under the ITRC support program supervised by the NIPA” (NIPA-2009-(C1090-0902-0016)).
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Akyildiz, I.F., Wang, X., Wang, W.: Wireless Mesh Networks: a Survey. Computer Networks 47(4) (2005)
IEEE 802.11s Task Group, Draft Amendment to Standard for Information Technology Telecommunications and Information Exchange Between Systems – LAN/MAN Specific Requirements – Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) specifications: Amendment: ESS Mesh Networking, IEEE P802.11s/D2.02 (September 2008)
Wang, X., Lim, A.O.: IEEE 802.11s Wireless Mesh Networks: Framework and Challenges. In: AdHoc Networks, pp. 1–15 (2007), doi:10.1016/j.adhoc.2007.09.003
Islam, M.S., Yoon, Y.J., Hamid, M.A., Hong, C.S.: A Secure Hybrid Wireless Mesh Protocol for 802.11s Mesh Network. In: Gervasi, O., Murgante, B., Laganà, A., Taniar, D., Mun, Y., Gavrilova, M.L. (eds.) ICCSA 2008, Part I. LNCS, vol. 5072, pp. 972–985. Springer, Heidelberg (2008)
Merkle, R.C.: A Certified Digital Signature (subtitle: That Antique Paper from 1979). In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)
Bahr, M.: Proposed Routing for IEEE 802.11s WLAN Mesh Networks. In: 2nd Annual International Wireless Internet Conference (WICON), Boston, MA, USA (2006)
IEEE P802.11sTM/D0.01, Draft amendment to standard IEEE 802.11TM: ESS Mesh Networking. IEEE (March 2006)
Bahr, M.: Update on the Hybrid Wireless Mesh protocol of 802.11s. In: Proc. of IEEE International Conference on Mobile Adhoc and Sensor Systems, 2007. MASS, pp. 1–6 (2007)
Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. In: Proc. MobiCom 2002, Atlanta, GA (2002)
Perrig, A., Canetti, R., Tygar, J.D., Song, D.: Efficient Authentication and Signing of Multicast Streams over Lossy Channels. In: Proc. of IEEE Symposium on Security and Privacy, 2000, pp. 56–73 (2002)
Gergely, A., Buttyan, L., Vajda, I.: Provably Secure On-demand Routing in Mobile Ad Hoc Networks. IEEE transactions on Mobile Computing 5(11), 1533–1546 (2006)
Zapata, M.G., Asokan, N.: Securing Adhoc Routing Protocols. In: Proc. of ACM Workshop of Wireless Security(Wise), pp. 1–10 (2002)
Sangiri, K., Dahil, B.: A Secure Routing Protocol for Ad Hoc Networks. In: Proc. of 10th IEEE International Conference on Network Protocols, ICNP 2002 (2002)
Szydlo, M.: Merkle Tree Traversal in Log Space and Time. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 541–554. Springer, Heidelberg (2004)
Jakobsson, M., Leighton, T., Micali, S., Szydlo, M.: Fractal Merkle Tree Representation and Traversal. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 314–326. Springer, Heidelberg (2003)
FIPS PUB 180-1, Secure Hash Standard, SHA-1, http://www.itl.nist.gov/fipspubs/fip180-1.htm
Lim, A.O., Wang, X., Kado, Y., Zhang, B.: A Hybrid Centralized Routing Protocol for 802.11s WMNs. Journal of Mobile Networks and Applications (2008)
The Network Simulator – ns-2, http://www.isi.edu/nsnam/ns/index.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Islam, M.S., Hamid, M.A., Hong, C.S. (2009). SHWMP: A Secure Hybrid Wireless Mesh Protocol for IEEE 802.11s Wireless Mesh Networks. In: Gavrilova, M.L., Tan, C.J.K. (eds) Transactions on Computational Science VI. Lecture Notes in Computer Science, vol 5730. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10649-1_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-10649-1_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-10648-4
Online ISBN: 978-3-642-10649-1
eBook Packages: Computer ScienceComputer Science (R0)