AFC: An Effective Metric for Reliable Routing in Wireless Mesh Networks

Routing metric plays a vital role in path selection process. A variety of routing metrics have been proposed to enhance the performance of routing protocols. Considering the forwarding behavior of neighbor node in the design of a routing metric would address the most generic packet dropping attacks in wireless mesh network (WMN). The existing routing metrics to address packet dropping attack in WMN only consider selfish mesh routers. On the other hand, to the best of our knowledge no such routing metric has been proposed to address the malicious behavior of mesh routers in a network. In this paper, we propose an airtime link metric AFC (Airtime Forwarding Capability), that considers both selfish and malicious behavior of mesh routers. AFC is computed using local station level measurements and does not require direct cooperation from any neighbor node, thereby avoiding neighbor lying attacks. The analysis of proposed metric shows that it satisfies the required design properties of a routing metric. The experimental results confirm the performance enhancement by accounting for the malicious behavior of mesh routers.

[1]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[2]  Gregory A. Hansen,et al.  The Optimized Link State Routing Protocol , 2003 .

[3]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[4]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[5]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[6]  Zheng Yan,et al.  Trust Evaluation Based Security Solution in Ad Hoc Networks , 2003 .

[7]  Robert Tappan Morris,et al.  a high-throughput path metric for multi-hop wireless routing , 2003, MobiCom '03.

[8]  Jitendra Padhye,et al.  Routing in multi-radio, multi-hop wireless mesh networks , 2004, MobiCom '04.

[9]  Douglas S. J. De Couto,et al.  High-throughput routing for multi-hop wireless networks , 2004 .

[10]  C. Mitchell,et al.  2 HARP : A SECURE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS , 2004 .

[11]  Niki Pissinou,et al.  Collaborative Trust-Based Secure Routing in Multihop Ad Hoc Networks , 2004, NETWORKING.

[12]  Mohammed Tarique,et al.  Routing overhead analysis for reactive routing protocols in wireless ad hoc networks , 2005, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005..

[13]  Ian F. Akyildiz,et al.  Wireless mesh networks: a survey , 2005, Comput. Networks.

[14]  Issa M. Khalil,et al.  LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).

[15]  S. Upadhyaya,et al.  Trust Based Routing Decisions in Mobile Ad-hoc Networks , 2006 .

[16]  A.P. Subramanian,et al.  Interference aware routing in multi-radio wireless mesh networks , 2006, 2006 2nd IEEE Workshop on Wireless Mesh Networks.

[17]  Neco Ventura,et al.  A metric to increase throughput in untrustworthy multi-hop wireless mesh networks , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..

[18]  Hari Balakrishnan,et al.  Quality-Aware Routing Metrics for Time-Varying Wireless Mesh Networks , 2006, IEEE Journal on Selected Areas in Communications.

[19]  Yuguang Fang,et al.  A secure incentive protocol for mobile ad hoc networks , 2007, Wirel. Networks.

[20]  Pramod K. Varshney,et al.  An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs , 2007, IEEE Transactions on Mobile Computing.

[21]  David Malone,et al.  MAC Layer Channel Quality Measurement in 802.11 , 2007, IEEE Communications Letters.

[22]  Ding Xuyang,et al.  Trust Evaluation Based Reliable Routing in Wireless Mesh Network , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.

[23]  Simon Pietro Romano,et al.  REFACING: An autonomic approach to network security based on multidimensional trustworthiness , 2008, Comput. Networks.

[24]  Yaling Yang,et al.  Design Guidelines for Routing Metrics in Multihop Wireless Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[25]  Simon Pietro Romano,et al.  A Reputation-Based Metric for Secure Routing in Wireless Mesh Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[26]  Paolo Santi,et al.  The COMMIT Protocol for Truthful and Cost-Efficient Routing in Ad Hoc Networks with Selfish Nodes , 2008, IEEE Transactions on Mobile Computing.

[27]  Xin Zhang,et al.  Packet-dropping adversary identification for data plane security , 2008, CoNEXT '08.

[28]  Jonathan Loo,et al.  SRPM: Secure Routing Protocol for IEEE 802.11 Infrastructure Based Wireless Mesh Networks , 2010, Journal of Network and Systems Management.

[29]  Yu Cheng,et al.  Mitigating selective forwarding attacks with a channel-aware approach in WMNS , 2010, IEEE Transactions on Wireless Communications.

[30]  Shaojie Tang,et al.  Dealing with Selfishness and Moral Hazard in Noncooperative Wireless Networks , 2010, IEEE Transactions on Mobile Computing.

[31]  Somanath Tripathy,et al.  Secure Peer-Link Establishment in Wireless Mesh Networks , 2012, ACITY.

[32]  Somanath Tripathy,et al.  Reliability Enhanced Routing Protocol for Wireless Mesh Networks , 2012, ACITY.

[33]  Antonio Capone,et al.  Cross-Layer Metrics for Reliable Routing in Wireless Mesh Networks , 2013, IEEE/ACM Transactions on Networking.