Skip to main content
Log in

Wormhole-Free Routing and DoS Attack Defense in Wireless Mesh Networks

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Owing to the growth in several applications, Wireless Mesh Networks (WMN) is emerging as a vital technology for future wireless networks. Wormhole attack is one of the major security threats, which can disturb majority of routing communications, even when placed strategically. Therefore, a technique that can find wormhole-free routes in the network is required. In order to achieve this, in this paper, we propose a Monitoring Technique for Wormhole-Free Routing and DoS Attack Defense in WMNs. Initially, finite state model is applied where the node keeps the information about its sender and neighborhood receiver. Then, wormhole-aware secure routing is implemented to find wormhole free routes in the network. Finally, the priority mechanism is applied where the data packets are transmitted based on their priority. Based on the finite state model and priority mechanism, the malicious or wormhole nodes in the network are removed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Jayanthi, M., & Mukunthan, M. A. (2012). A security architecture for implementing anonymity and traceability in wireless mesh network using clustering concept. International Journal of Soft Computing and Engineering (IJSCE). ISSN: 2231-2307, vol 1, Issue-ETIC-2011.

  2. Li, C., Wang, Z., & Yang, C. (2011). Secure routing for wireless mesh networks. International Journal of Network Security, 13(2), 109–120.

    Google Scholar 

  3. Oliviero, F., & Romano, S. P. (2008). A reputation-based metric for secure routing in wireless mesh networks. In IEEE “GLOBECOM”, 978-1-4244-2324-8/08/$25.00 ©. IEEE.

  4. Lin, H., Ma, J., Hu, J., & Yang, K. (2012). PA-SHWMP: A privacy-aware secure hybrid wireless mesh protocol for IEEE 802.11s wireless mesh networks. EURASIP Journal on Wireless Communications and Networking. doi:10.1186/1687-1499-2012-69.

    Google Scholar 

  5. Khan, K., & Akbar, M. (2008). Authentication in multi-hop wireless mesh networks. World Academy of Science, Engineering and Technology, 2(10).

  6. Zeng, Y., et al. (2013). Directional routing and scheduling for green vehicular delay tolerant networks. Wireless Networks, 19(2), 161–173.

    Article  Google Scholar 

  7. Jing, Q., et al. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20(8), 2481–2501.

    Article  Google Scholar 

  8. Wang, X., et al. (2012). A survey of green mobile networks: Opportunities and challenges. MONET, 17(1), 4–20.

    Google Scholar 

  9. Li, X., et al. (2015). A review of industrial wireless networks in the context of industry 4.0. Wireless Networks. doi:10.1007/s11276-015-1133-7.

    Google Scholar 

  10. Li, P. et al. (2012). CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding. In INFOCOM (pp. 100–108).

  11. Song, Y., et al. (2014). A biology-based algorithm to minimal exposure problem of wireless sensor networks. IEEE Transactions on Network and Service Management, 11(3), 417–430.

    Article  MathSciNet  Google Scholar 

  12. Liu, L., et al. (2015). Physarum optimization: A biology-inspired algorithm for the steiner tree problem in networks. IEEE Transactions on Computers, 64(3), 819–832.

    MathSciNet  MATH  Google Scholar 

  13. Liu, Y., et al. (2010). Multi-layer clustering routing algorithm for wireless vehicular sensor networks. IET Communications, 4(7), 810–816.

    Article  Google Scholar 

  14. Busch, C., et al. (2012). Approximating congestion + dilation in networks via “quality of routing” games. IEEE Transactions on Computers, 61(9), 1270–1283.

    Article  MathSciNet  Google Scholar 

  15. Li, P., et al. (2014). Reliable multicast with pipelined network coding using opportunistic feeding and routing. IEEE Transactions on Parallel and Distributed Systems, 25(12), 3264–3273.

    Article  Google Scholar 

  16. Meng, T., et al. (2015). Spatial reusability-aware routing in multi-hop wireless networks. IEEE Transactions on Computers. doi:10.1109/TC.2015.2417543.

    MATH  Google Scholar 

  17. Dvir, A., et al. (2011). Backpressure-based routing protocol for DTNs. ACM SIGCOMM Computer Communication Review, 41(4), 405–406.

    Google Scholar 

  18. Yen, Y.-S., et al. (2011). Flooding-limited and multi-constrained QoS multicast routing based on the genetic algorithm for MANETs. Mathematical and Computer Modelling, 53(11–12), 2238–2250.

    Article  Google Scholar 

  19. Sen, J. (2013). Secure and privacy-preserving authentication protocols for wireless mesh networks. Innovation Lab, Tata Consultancy Services Ltd. eprint arXiv: 1209.1803, Publication Date: 09/2012. doi:10.5772/39176. www.intechopen.com.

  20. Redwan, H., & Kim, K.-H. (2008). Survey of security requirements, attacks and network integration in wireless mesh networks. 978-0-7695-3540-1/08 $25.00 © 2008 IEEE. doi:10.1109/FCST.2008.

  21. Spyropoulos, T., et al. (2010). Routing for disruption tolerant networks: Taxonomy and design. Wireless Networks, 16(8), 2349–2370.

    Article  Google Scholar 

  22. Vasilakos, A., et al. (2012). Delay tolerant networks: Protocols and applications. Boca Raton: CRC Press.

    Google Scholar 

  23. Youssef, M., et al. (2014). Routing metrics of cognitive radio networks: A survey. IEEE Communications Surveys and Tutorials, 16(1), 92–109.

    Article  MathSciNet  Google Scholar 

  24. Woungang, I., et al. (2013). Routing in opportunistic networks. Berlin: Springer.

    Book  MATH  Google Scholar 

  25. Zhang, X. M., et al. (2015). Interference-based topology control algorithm for delay-constrained mobile Ad hoc networks. IEEE Transactions on Mobile Computing, 14(4), 742–754.

    Article  Google Scholar 

  26. Duarte, P. B. F., et al. (2012). On the partially overlapped channel assignment on wireless mesh network backbone: A game theoretic approach. IEEE Journal on Selected Areas in Communications, 30(1), 119–127.

    Article  Google Scholar 

  27. Attar, A., et al. (2012). A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE, 100(12), 3172–3186.

    Article  Google Scholar 

  28. Vasilakos, A. V., et al. (2015). Information centric network: Research challenges and opportunities. Journal of Network and Computer Applications, 52, 1–10.

    Article  Google Scholar 

  29. Yao, Y. et al. (2013) EDAL: An energy-efficient, delay-aware, and lifetime-balancing data collection protocol for wireless sensor networks. In MASS 1(pp. 82–190).

  30. Marwaha, S. et al. (2004). Evolutionary fuzzy multi-objective routing for wireless mobile ad hoc networks. In Evolutionary Computation, 2004. CEC2004. Congress on. (Vol. 2, pp. 1964–1971).

  31. Vasilakos, A. et al. (2003). Optimizing QoS routing in hierarchical ATM networks using computational intelligence techniques. IEEE Systems, Man, and Cybernetics, Part C: Applications and Reviews.

  32. Quan, W. et al. (2014). TB2F: Tree-bitmap and bloom-filter for a scalable and efficient name lookup in content-centric networking. In IFIP Networking.

  33. Aswal, M. S., Rawat, P., & Kumar, T. (2009). Threats and vulnerabilities in wireless mesh networks. International Journal of Recent Trends in Engineering, 2(4).

  34. Yao, G., et al. (2015). Passive IP traceback: Disclosing the locations of IP spoofers from path backscatter. IEEE Transactions on Information Forensics and Security, 10(3), 471–484.

    Article  MathSciNet  Google Scholar 

  35. Yang, H., et al. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29–38.

    Article  Google Scholar 

  36. Liu, B., et al. (2014). Toward incentivizing anti-spoofing deployment. IEEE Transactions on Information Forensics and Security, 9(3), 436–450.

    Article  Google Scholar 

  37. Zhou, J., et al. (2015). Secure and privacy preserving protocol for cloud-based vehicular DTNs. IEEE Transactions on Information Forensics and Security, 10(6), 1299–1314.

    Article  Google Scholar 

  38. Liu, J., et al. (2016). Leveraging software-defined networking for security policy enforcement. Information Sciences, 327, 288–299.

    Article  Google Scholar 

  39. Luan, L., Fu, Y., & Xiao, P. (2012). An effective denial of service attack detection method in wireless mesh networks. Physics Procedia, 33, 354–360.

    Article  Google Scholar 

  40. Bansal, D., Sofat, S., & Singh, G. (2010). Secure routing protocol for hybrid wireless mesh network (HWMN). In Computer and Communication Technology (ICCCT), 2010 International Conference (pp. 837–843). Print ISBN: 978-1-4244-9033-2, 978-1-4244-9034/10/$26.00©2010 IEEE, 17–19 Sept. 2010.

  41. Kandah, F., Singh, Y., & Zhang, W. (2012). Mitigating eavesdropping attack using secure key management scheme in wireless mesh networks. Journal of Communications, 7(8), 596–605.

    Article  Google Scholar 

  42. Matam, R., & Tripathy, S. (2013). WRSR: Wormhole-resistant secure routing for wireless mesh networks. EURASIP Journal on Wireless Communications and Networking.

  43. Sen, J. (2010). Efficient routing anomaly detection in wireless mesh networks. In First International Conference on Integrated Intelligent Computing, 978-0-7695-4152-5/10 $26.00 © 2010 IEEE.

  44. Network Simulator: http://www.isi.edu/nsnam/ns.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to G. Akilarasu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Akilarasu, G., Shalinie, S.M. Wormhole-Free Routing and DoS Attack Defense in Wireless Mesh Networks. Wireless Netw 23, 1709–1718 (2017). https://doi.org/10.1007/s11276-016-1240-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-016-1240-0

Keywords

Navigation