Skip to main content

Advertisement

Log in

SRPM: Secure Routing Protocol for IEEE 802.11 Infrastructure Based Wireless Mesh Networks

  • Published:
Journal of Network and Systems Management Aims and scope Submit manuscript

Abstract

Infrastructure based IEEE 802.11 wireless mesh networks (WMNs) are new paradigm of low cost broadband technology. The large scale city-wide community-based coverage and multi-hop architecture are such characteristics which are vulnerable to network layer threats, and the adversary can exploit them for large scale degradation of the broadband services. So far many secure routing protocols have been proposed for ad-hoc networks, however, due to the different nature and characteristics; they cannot perform well in a WMN environment. In this paper, we discuss the limitations and challenges as well as propose an exclusive secure routing protocol for an infrastructure based wireless mesh (SRPM) network. SRPM is robust against a variety of multi-hop threats and performs well over a range of scenarios we tested.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Khan, S., Mast, N., Loo, K.-K., Silahuddin, A.: Cloned access point detection and prevention mechanism in IEEE 802.11 wireless mesh networks. Int. J. Inf. Assur. Secur. 3(4), 257–262 (2008)

    Google Scholar 

  2. Akyildiz, I.F., Wang, X.: A survey on wireless mesh networks. IEEE Commun. Mag. 43(9), 23–30 (2005)

    Article  Google Scholar 

  3. Mir, S., Pirzada, A.A., Portmann, M.: HOVER: hybrid on-demand distance vector routing for wireless mesh networks. Proceedings of 31st Australasian Science Conference (ACSC) (2008)

  4. Jun, J., Sichitiu, M.L.: MRP: wireless mesh networks routing protocol. Comput. Commun. 31(7), 1413–1435 (2008)

    Article  Google Scholar 

  5. Asherson, S., Hutchison, A.: Secure routing in wireless mesh networks. http://pubs.cs.uct.ac.za/archive/00000318/01/SATNAC2006WIP.pdf. Accessed Feb 2009

  6. Patwardhan, A., Iorga, M.: Secure routing and intrusion detection in ad hoc networks. Proceedings of the 3rd International Conference on Pervasive Computing and Communications (PerCom) (2005)

  7. Perkins, C., Royer, E.M., Das, S.: Ad-hoc on demand distance vector (AODV) routing, IETF, RFC 3561 (2003)

  8. Waharte, S., Boutaba, R., Iraqi, Y., Ishibashi, B.: Routing protocols in wireless mesh networks: challenges and design considerations. Springer Multimed. Tool Appl. 31(3), 285–303 (2006)

    Article  Google Scholar 

  9. Tsai, J., Moors, T.: A review of multipath routing protocols: from wireless ad hoc to mesh networks. Proceedings of the ACoRN Early Career Researcher Workshop on Wireless Multihop Networking, 17–18 July 2006

  10. Ramachandran, K.N., Buddhikot, M.M., Chandranmenon, G., Miller, S., B-Royer, E.M., Almeroth, K.C.: On the design and implementation of infrastructure mesh networks. Proceedings of the IEEE Workshop on Wireless Mesh Networks (WiMesh) (2005)

  11. Baumann, R., Heimlicher, S., Lenders, V., May, M.: Routing packets into wireless mesh networks. Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, (WiMOB) (2007)

  12. Cheng, B.-N., Yuksel, M., Kalyanaraman, S.: Orthogonal rendezvous routing protocol for wireless mesh networks. Proceedings of the 14th IEEE International Conference on Network Protocols (ICNP) (2006)

  13. Lin, D., Moh, T.-S., Moh, M.: A delay-bounded multi-channel routing protocol for wireless mesh networks using multiple token rings: extended summery. Proceedings of 31st IEEE Conference on Local Computer Networks (2006)

  14. Perkins, C., Bhagwat, P.: Highly dynamic destination sequenced distance vector routing (DSDV) for mobile computers. Proceedings of the ACM SIGCOMM (1994)

  15. Chen, T.-W., Gerla, M.: Global state routing: a new routing scheme for ad hoc wireless networks. Proceedings of IEEE International Conference on Communications (ICC) (1998)

  16. Zheng, J., Lee, M.J.: A resource-efficient and scalable wireless mesh routing protocol. Elsevier Ad hoc Netw. 5, 704–718 (2007)

    Article  Google Scholar 

  17. Shittu, W.A., Hassan, A., Hashim, A., Anwar, F., Al-Khateeb, W.: A proposed QoS multicast routing framework for next generation wireless mesh networks. Int. J. Comput. Sci. Netw. Secur. 8(9), 280–284 (2008)

    Google Scholar 

  18. Dai, L., Xue, Y., Chang, B., Cao, Y., Cui, Y.: Optimal Routing for Wireless Mesh Networks With Dynamic Traffic Demand. Springer J. Mobile Netw. Appl. 13(1–2), 97–116 (2008)

    Article  Google Scholar 

  19. Yuan, Y., Yang, H., Wong, S.H.Y., Lu, S., Arbaugh, W.: ROMER: resilient opportunistic mesh routing for wireless mesh networks. First IEEE Workshop on Wireless Mesh Networks (WiMesh) (2005)

  20. Aguayo, D., Bicket, J., Morris, R.: ScrRR: a high throughput routing protocol for 802.11 mesh networks (2004)

  21. Baumann, R., Heimlicher, S., Lenders, V., May, M.: HEAT: scalable routing in wireless mesh networks using temperature fields. IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM) (2007)

  22. Argyroudis, P.G., Mahony, D.O.: Secure routing for mobile ad hoc networks. IEEE Commun. Surv. Tutor. 7(3), 2–21 (2005)

    Article  Google Scholar 

  23. Siddiqui, M.S., Amin, S.O., Kim, J.H., Hong, C.S.: MHRP: a secure multipath hybrid routing protocol for wireless mesh network,” IEEE Military Communication Conference (MILCOM) (2007)

  24. Kandikattu, R., Jacob, L.: A secure intra-domain routing protocol for wireless mesh networks. Springer LNCS 4812, pp. 37–50 (2007)

    Google Scholar 

  25. Carbunar, B., Ioannidis, I., N-Rotaru, C.: JANUS: a framework for scalable and secure routing in hybrid wireless networks. IEEE Trans. Dependable Secur. Comput. (2008). doi:10.1109/TDSC.2008.14

  26. Xiao, Y., Bandela, C., Pan, Y.: Vulnerabilities and security enhancement for the IEEE 802.11 WLANs. IEEE Global Telecommunications Conference (Globecom) (2005)

  27. Bellardo, J., Savage, S.: 802.11 Denial-of-service attacks: real vulnerabilities and practical solutions. Proceedings of the 12th USENIX security symposium, pp. 15–28 (August 2003)

  28. Motorola: Mesh networks, delivering IP-Based seamless mobility in municipal and ad-hoc wireless networks. White paper (2006)

  29. Awerbuch, B., Holmer, D., Rotaru, C., Rubens, H.: An on demand secure routing protocol resilient to Byzantine failure. ACM Proceedings on wireless security (2002)

  30. Module 7, routing and congestion control, Version 2 CSE IIT, Kharagpur. http://nptel.iitm.ac.in. Accessed Feb 2009

  31. Andel, T.R., Yasinsac, A.: Surveying security analysis techniques in MANET routing protocols. IEEE Commun. Surv. Tutor 9(4) (2007)

  32. Wang, Y., Attebury, G., Ramamurthy, B.: A survey of security issues in wireless sensor networks. IEEE Commun. Surv. Tutor. 8(2), 2–23 (2006)

    Article  Google Scholar 

  33. Hu, Y-.C., Perrig, A., Johnson, D.B.: Packet leashes: a defence against Wormhole attacks in wireless networks. 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM) (2003)

  34. Xing, F., Wang, W.: Understanding dynamic denial of service attack in mobile ad hoc networks. IEEE Military Communication Conference (MILCOM) (2006)

  35. Choi, S., Kim, D., Lee, D., Jung, J.: WAP: wormhole attack prevention algorithm in mobile ad hoc networks. IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (2008)

  36. Zhang, Y., Luo, J., Hu, H.: Wireless Mesh Networking, Architectures, Protocols and Standards, 1st ed. Auerbach Publications, Taylor & Francis Group, NY, ISBN: 0849373999 (2006)

  37. Santhanam, L., Nandiraju, D., Nandiraju, N., Agrawal, D.P.: Active cache based defence against DoS attacks in Wireless Mesh Network. 2nd IEEE International Symposium on Wireless Pervasive Computing (2007)

  38. Ferreri, F. Bernaschi, M. Valcamonici, L.: Access point vulnerabilities to DoS attacks in 802.11 networks. IEEE Wireless Communications and Networking Conference (March 2004)

  39. Deng, H.M., Li, W., Agarwal, D.P.: Routing Security in Wireless Ad Hoc Networks. IEEE Commun. Mag. 40(10), 70–75 (2002)

    Article  Google Scholar 

  40. Nait-Abdesselam, F., Bensaou, B., Taleb, T.: Detecting and avoiding wormhole attacks in wireless Ad hoc networks. IEEE Commun. Mag. 46(4), 127–133 (2008)

    Article  Google Scholar 

  41. Zouridaki, C., Mark, B.L., Hejmo, M.: Byzantine robust trust establishment for mobile ad hoc networks. Springer J. Telecommun. Syst. 35(3–4), 189–206 (2007)

    Article  Google Scholar 

  42. Routing basics, Cisco Internetworking handbook. http://users.teilam.gr/~skontos/tei_site/html/pdf_cisco/Routing/routing_basic.pdf. Accessed Feb 2009

  43. Walden, D.: The bellman-ford algorithm and distributed bellman-ford. http://www.walden-family.com/public/bf-history.pdf. Accessed Dec 2008

  44. Madhusudhan, N.: Simulation of Bellman’s algorithm. http://www.laynetworks.com/Simulation%20of%20Bellman%20Algorithm.htm. Accessed Dec 2008)

  45. Pandurangan, G.: Purdue University research 2004. http://www.cs.purdue.edu/homes/gopal/cs580-2004/19.pdf. Accessed Dec 2008

  46. Hu, Y.-C., Johnson, D.B., Perrig, D.: SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. Elsevier Ad Hoc Netw. 1, 175–192 (2003)

    Article  Google Scholar 

  47. Floyd, S., Jacobson, V.: Random early detection gateways for congestion avoidance. IEEE Trans. Netw. 1(4) (1993)

  48. Xu, K., Gerla, M., Qi, L., Shu, Y.: Enhancing TCP fairness in ad hoc wireless networks using neighborhood red. Proceedings of ACM MOBICOM (2003)

  49. Johnson, D., Maltz, D.A.: Dynamic Source Routing in Ad Hoc Wireless Networks, Chapter 5, pp. 153–181. Kluwer, Dordrecht (1996)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shafiullah Khan.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Khan, S., Loo, KK., Mast, N. et al. SRPM: Secure Routing Protocol for IEEE 802.11 Infrastructure Based Wireless Mesh Networks. J Netw Syst Manage 18, 190–209 (2010). https://doi.org/10.1007/s10922-009-9143-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10922-009-9143-3

Keywords