Skip to main content

Secure Peer-Link Establishment in Wireless Mesh Networks

  • Conference paper
Advances in Computing and Information Technology

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 176))

Abstract

Wireless Mesh Network (WMN) has become popular, as it allows fast, easy and inexpensive network deployment. It is observed that the current peer link establishment mechanism presented in IEEE 802.11s draft standard is vulnerable to various kinds of relay and wormhole attacks. In this paper, we propose a certificate-based peer link establishment protocol that employs location information to prevent such attacks. The security analysis shows that the proposed mechanism is resistant against different kinds of wormhole, relay and Sybil attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akyildiz, I.F., Wang, X., Wang, W.: Wireless mesh networks: A survey. Computer Networks and ISDN Systems (2005)

    Google Scholar 

  2. IEEE P802.11s/D5.0 Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY)specifications, Amendment 10: Mesh Networking

    Google Scholar 

  3. Zapata, M., Asokan, N.: Securing ad-hoc routing protocols. In: Proceedings of ACM Workshop on Wireless Security, pp. 1–10 (September 2002)

    Google Scholar 

  4. Li, C., Wang, Z., Yang, C.: Secure Routing for Wireless Mesh Networks. International Journal of Network Security 13(2), 109–120 (2011)

    Google Scholar 

  5. Zhu, S., Xu, S., Setia, S., Jajodia, S.: LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks. In: Proceedings of ICDCS International Workshop on Mobile and Wireless Network, Providence, Rodhe Island, pp. 749–755 (May 2003)

    Google Scholar 

  6. Sangiri, K., Dahil, B.: A secure routing protocol for ad hoc networks. In: Proceedings of 10th IEEE International Conference on Network Protocols, pp. 78–89 (2002)

    Google Scholar 

  7. Matam, R., Tripathy, S.: FRI Attack: Fraudulent Routing Information Attack on Wireless Mesh Networks. In: Proc. of IEEE Xplore, ACWR (2011)

    Google Scholar 

  8. Hu, Y., Perrig, A., Johnson, D.: Packet leashes: A defence against wormhole attacks in wireless networks. In: Proc. of the Twenty-second IEEE International Conference on Computer Communications (April 2003)

    Google Scholar 

  9. Poovendran, R., Lazos, L.: A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. ACM Journal of Wireless Networks 13(1), 2759 (2005)

    Google Scholar 

  10. Wang, X., Wong, J.: An end-to-end detection of wormhole attack in wireless ad-hoc networks. In: Proc. of the Thirty-First Annual International Computer Software and Applications Conference (July 2007)

    Google Scholar 

  11. Wang, Y., Zhang, Z.: A Distributed Approach for Hidden Wormhole Detection with Neighborhood Information. In: IEEE Fifth International Conference on Networking, Architecture and Storage, NAS (2010)

    Google Scholar 

  12. Hayajneh, T., Krishnamurthy, P., Tipper, D.: Deworm: A simple protocol to detect wormhole attacks in wireless ad hoc networks. In: Proceedings of the IEEE Symposium on Network and System Security (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Swathi Bhumireddy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bhumireddy, S., Tripathy, S., Matam, R. (2012). Secure Peer-Link Establishment in Wireless Mesh Networks. In: Meghanathan, N., Nagamalai, D., Chaki, N. (eds) Advances in Computing and Information Technology. Advances in Intelligent Systems and Computing, vol 176. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31513-8_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31513-8_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31512-1

  • Online ISBN: 978-3-642-31513-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics