Abstract
Infrastructure based IEEE 802.11 wireless mesh networks (WMNs) are new paradigm of low cost broadband technology. The large scale city-wide community-based coverage and multi-hop architecture are such characteristics which are vulnerable to network layer threats, and the adversary can exploit them for large scale degradation of the broadband services. So far many secure routing protocols have been proposed for ad-hoc networks, however, due to the different nature and characteristics; they cannot perform well in a WMN environment. In this paper, we discuss the limitations and challenges as well as propose an exclusive secure routing protocol for an infrastructure based wireless mesh (SRPM) network. SRPM is robust against a variety of multi-hop threats and performs well over a range of scenarios we tested.














Similar content being viewed by others
References
Khan, S., Mast, N., Loo, K.-K., Silahuddin, A.: Cloned access point detection and prevention mechanism in IEEE 802.11 wireless mesh networks. Int. J. Inf. Assur. Secur. 3(4), 257–262 (2008)
Akyildiz, I.F., Wang, X.: A survey on wireless mesh networks. IEEE Commun. Mag. 43(9), 23–30 (2005)
Mir, S., Pirzada, A.A., Portmann, M.: HOVER: hybrid on-demand distance vector routing for wireless mesh networks. Proceedings of 31st Australasian Science Conference (ACSC) (2008)
Jun, J., Sichitiu, M.L.: MRP: wireless mesh networks routing protocol. Comput. Commun. 31(7), 1413–1435 (2008)
Asherson, S., Hutchison, A.: Secure routing in wireless mesh networks. http://pubs.cs.uct.ac.za/archive/00000318/01/SATNAC2006WIP.pdf. Accessed Feb 2009
Patwardhan, A., Iorga, M.: Secure routing and intrusion detection in ad hoc networks. Proceedings of the 3rd International Conference on Pervasive Computing and Communications (PerCom) (2005)
Perkins, C., Royer, E.M., Das, S.: Ad-hoc on demand distance vector (AODV) routing, IETF, RFC 3561 (2003)
Waharte, S., Boutaba, R., Iraqi, Y., Ishibashi, B.: Routing protocols in wireless mesh networks: challenges and design considerations. Springer Multimed. Tool Appl. 31(3), 285–303 (2006)
Tsai, J., Moors, T.: A review of multipath routing protocols: from wireless ad hoc to mesh networks. Proceedings of the ACoRN Early Career Researcher Workshop on Wireless Multihop Networking, 17–18 July 2006
Ramachandran, K.N., Buddhikot, M.M., Chandranmenon, G., Miller, S., B-Royer, E.M., Almeroth, K.C.: On the design and implementation of infrastructure mesh networks. Proceedings of the IEEE Workshop on Wireless Mesh Networks (WiMesh) (2005)
Baumann, R., Heimlicher, S., Lenders, V., May, M.: Routing packets into wireless mesh networks. Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, (WiMOB) (2007)
Cheng, B.-N., Yuksel, M., Kalyanaraman, S.: Orthogonal rendezvous routing protocol for wireless mesh networks. Proceedings of the 14th IEEE International Conference on Network Protocols (ICNP) (2006)
Lin, D., Moh, T.-S., Moh, M.: A delay-bounded multi-channel routing protocol for wireless mesh networks using multiple token rings: extended summery. Proceedings of 31st IEEE Conference on Local Computer Networks (2006)
Perkins, C., Bhagwat, P.: Highly dynamic destination sequenced distance vector routing (DSDV) for mobile computers. Proceedings of the ACM SIGCOMM (1994)
Chen, T.-W., Gerla, M.: Global state routing: a new routing scheme for ad hoc wireless networks. Proceedings of IEEE International Conference on Communications (ICC) (1998)
Zheng, J., Lee, M.J.: A resource-efficient and scalable wireless mesh routing protocol. Elsevier Ad hoc Netw. 5, 704–718 (2007)
Shittu, W.A., Hassan, A., Hashim, A., Anwar, F., Al-Khateeb, W.: A proposed QoS multicast routing framework for next generation wireless mesh networks. Int. J. Comput. Sci. Netw. Secur. 8(9), 280–284 (2008)
Dai, L., Xue, Y., Chang, B., Cao, Y., Cui, Y.: Optimal Routing for Wireless Mesh Networks With Dynamic Traffic Demand. Springer J. Mobile Netw. Appl. 13(1–2), 97–116 (2008)
Yuan, Y., Yang, H., Wong, S.H.Y., Lu, S., Arbaugh, W.: ROMER: resilient opportunistic mesh routing for wireless mesh networks. First IEEE Workshop on Wireless Mesh Networks (WiMesh) (2005)
Aguayo, D., Bicket, J., Morris, R.: ScrRR: a high throughput routing protocol for 802.11 mesh networks (2004)
Baumann, R., Heimlicher, S., Lenders, V., May, M.: HEAT: scalable routing in wireless mesh networks using temperature fields. IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM) (2007)
Argyroudis, P.G., Mahony, D.O.: Secure routing for mobile ad hoc networks. IEEE Commun. Surv. Tutor. 7(3), 2–21 (2005)
Siddiqui, M.S., Amin, S.O., Kim, J.H., Hong, C.S.: MHRP: a secure multipath hybrid routing protocol for wireless mesh network,” IEEE Military Communication Conference (MILCOM) (2007)
Kandikattu, R., Jacob, L.: A secure intra-domain routing protocol for wireless mesh networks. Springer LNCS 4812, pp. 37–50 (2007)
Carbunar, B., Ioannidis, I., N-Rotaru, C.: JANUS: a framework for scalable and secure routing in hybrid wireless networks. IEEE Trans. Dependable Secur. Comput. (2008). doi:10.1109/TDSC.2008.14
Xiao, Y., Bandela, C., Pan, Y.: Vulnerabilities and security enhancement for the IEEE 802.11 WLANs. IEEE Global Telecommunications Conference (Globecom) (2005)
Bellardo, J., Savage, S.: 802.11 Denial-of-service attacks: real vulnerabilities and practical solutions. Proceedings of the 12th USENIX security symposium, pp. 15–28 (August 2003)
Motorola: Mesh networks, delivering IP-Based seamless mobility in municipal and ad-hoc wireless networks. White paper (2006)
Awerbuch, B., Holmer, D., Rotaru, C., Rubens, H.: An on demand secure routing protocol resilient to Byzantine failure. ACM Proceedings on wireless security (2002)
Module 7, routing and congestion control, Version 2 CSE IIT, Kharagpur. http://nptel.iitm.ac.in. Accessed Feb 2009
Andel, T.R., Yasinsac, A.: Surveying security analysis techniques in MANET routing protocols. IEEE Commun. Surv. Tutor 9(4) (2007)
Wang, Y., Attebury, G., Ramamurthy, B.: A survey of security issues in wireless sensor networks. IEEE Commun. Surv. Tutor. 8(2), 2–23 (2006)
Hu, Y-.C., Perrig, A., Johnson, D.B.: Packet leashes: a defence against Wormhole attacks in wireless networks. 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM) (2003)
Xing, F., Wang, W.: Understanding dynamic denial of service attack in mobile ad hoc networks. IEEE Military Communication Conference (MILCOM) (2006)
Choi, S., Kim, D., Lee, D., Jung, J.: WAP: wormhole attack prevention algorithm in mobile ad hoc networks. IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (2008)
Zhang, Y., Luo, J., Hu, H.: Wireless Mesh Networking, Architectures, Protocols and Standards, 1st ed. Auerbach Publications, Taylor & Francis Group, NY, ISBN: 0849373999 (2006)
Santhanam, L., Nandiraju, D., Nandiraju, N., Agrawal, D.P.: Active cache based defence against DoS attacks in Wireless Mesh Network. 2nd IEEE International Symposium on Wireless Pervasive Computing (2007)
Ferreri, F. Bernaschi, M. Valcamonici, L.: Access point vulnerabilities to DoS attacks in 802.11 networks. IEEE Wireless Communications and Networking Conference (March 2004)
Deng, H.M., Li, W., Agarwal, D.P.: Routing Security in Wireless Ad Hoc Networks. IEEE Commun. Mag. 40(10), 70–75 (2002)
Nait-Abdesselam, F., Bensaou, B., Taleb, T.: Detecting and avoiding wormhole attacks in wireless Ad hoc networks. IEEE Commun. Mag. 46(4), 127–133 (2008)
Zouridaki, C., Mark, B.L., Hejmo, M.: Byzantine robust trust establishment for mobile ad hoc networks. Springer J. Telecommun. Syst. 35(3–4), 189–206 (2007)
Routing basics, Cisco Internetworking handbook. http://users.teilam.gr/~skontos/tei_site/html/pdf_cisco/Routing/routing_basic.pdf. Accessed Feb 2009
Walden, D.: The bellman-ford algorithm and distributed bellman-ford. http://www.walden-family.com/public/bf-history.pdf. Accessed Dec 2008
Madhusudhan, N.: Simulation of Bellman’s algorithm. http://www.laynetworks.com/Simulation%20of%20Bellman%20Algorithm.htm. Accessed Dec 2008)
Pandurangan, G.: Purdue University research 2004. http://www.cs.purdue.edu/homes/gopal/cs580-2004/19.pdf. Accessed Dec 2008
Hu, Y.-C., Johnson, D.B., Perrig, D.: SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. Elsevier Ad Hoc Netw. 1, 175–192 (2003)
Floyd, S., Jacobson, V.: Random early detection gateways for congestion avoidance. IEEE Trans. Netw. 1(4) (1993)
Xu, K., Gerla, M., Qi, L., Shu, Y.: Enhancing TCP fairness in ad hoc wireless networks using neighborhood red. Proceedings of ACM MOBICOM (2003)
Johnson, D., Maltz, D.A.: Dynamic Source Routing in Ad Hoc Wireless Networks, Chapter 5, pp. 153–181. Kluwer, Dordrecht (1996)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Khan, S., Loo, KK., Mast, N. et al. SRPM: Secure Routing Protocol for IEEE 802.11 Infrastructure Based Wireless Mesh Networks. J Netw Syst Manage 18, 190–209 (2010). https://doi.org/10.1007/s10922-009-9143-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10922-009-9143-3