Securely-entrusted multi-topology routing for community networks

Routing in open and decentralized networks relies on cooperation despite the participation of unknown nodes and node administrators pursuing heterogeneous trust and security goals. Living use cases for such environments are given by community mesh networks due to their open structure and decentralized management and ownership. However, despite many active work in the field of routing security for mesh and MANET networks, practical solutions enabling a secured but decentralized trust management are still missing, leaving nowadays existing community networks vulnerable to various attacks and seriously challenged by the obligation to find consensus on the trustability of participants within an increasing user size and diversity. This work presents the design, implementation and analysis of a routing protocol that enables cryptographically secured negotiation and establishment of concurrent and individually trusted routing topologies for infrastructure-less networks without relying on any central management. Benchmarking results, based on our initial implementation and tested on real and very cheap (10 Euro, Linux SoC) embedded routers, quantify the scalability of our approach supporting networks with hundreds of nodes and despite being based on supposedly CPU-expensive asymmetric cryptography.

[1]  Bart Braem,et al.  A questionnaire based examination of community networks , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[2]  Philippe Jacquet,et al.  Internet Engineering Task Force (ietf) the Optimized Link State Routing Protocol Version 2 , 2022 .

[3]  Rafael Timóteo de Sousa Júnior,et al.  Trust-based security for the OLSR routing protocol , 2013, Comput. Commun..

[4]  Abhay Roy,et al.  Multi-Topology (MT) Routing in OSPF , 2007, RFC.

[5]  Charles E. Perkins,et al.  Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.

[6]  Zoltán Horváth,et al.  Motivations, Design and Business Models of Wireless Community Networks , 2008, Mob. Networks Appl..

[7]  Leandro Navarro-Moldes,et al.  Evaluation of mesh routing protocols for wireless community networks , 2015, Comput. Networks.

[8]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[9]  M. Hauge,et al.  Multi-Topology routing for QoS support in the CoNSIS convoy MANET , 2012, 2012 Military Communications and Information Systems Conference (MCC).

[10]  Mohsen Guizani,et al.  A survey of secure mobile Ad Hoc routing protocols , 2008, IEEE Communications Surveys & Tutorials.

[11]  Robert M. Hinden,et al.  Unique Local IPv6 Unicast Addresses , 2005, RFC.

[12]  Jiannong Cao,et al.  Analysis and Countermeasure for Wormhole Attacks in Wireless Mesh Networks on a Real Testbed , 2012, 2012 IEEE 26th International Conference on Advanced Information Networking and Applications.

[13]  Manel Guerrero Zapata Secure Ad hoc On-Demand Distance Vector (SAODV) Routing , 2006 .

[14]  Llorenç Cerdà-Alabern,et al.  Experimental evaluation of a wireless community mesh network , 2013, MSWiM.

[15]  Ian F. Akyildiz,et al.  Wireless mesh networks: a survey , 2005, Comput. Networks.

[16]  Tuomas Aura,et al.  Cryptographically Generated Addresses (CGA) , 2005, ISC.

[17]  Rudra Dutta,et al.  A Survey of Network Design Problems and Joint Design Approaches in Wireless Mesh Networks , 2011, IEEE Communications Surveys & Tutorials.

[18]  Terry Koziniec,et al.  An experimental comparison of routing protocols in multi hop ad hoc networks , 2010, 2010 Australasian Telecommunication Networks and Applications Conference.

[19]  Elizabeth M. Belding-Royer,et al.  Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.

[20]  Leandro Navarro-Moldes,et al.  A technological overview of the guifi.net community network , 2015, Comput. Networks.

[21]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[22]  Leandro Navarro-Moldes,et al.  Receiver-driven routing for community mesh networks , 2013, 2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).

[23]  Ralf Steinmetz,et al.  A security framework for wireless mesh networks , 2011, Wirel. Commun. Mob. Comput..

[24]  Mukesh Singhal,et al.  Secure routing in mobile wireless ad hoc networks , 2003, Ad Hoc Networks.

[25]  Elizabeth M. Belding-Royer,et al.  AODV routing protocol implementation design , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..

[26]  Matthias Hollick,et al.  Routing performance of Wireless Mesh Networks: A practical evaluation of BATMAN advanced , 2011, 2011 IEEE 36th Conference on Local Computer Networks.

[27]  Llorenç Cerdà-Alabern,et al.  Experimental Evaluation of BMX6 Routing Metrics in a 802.11an Wireless-Community Mesh Network , 2015, 2015 3rd International Conference on Future Internet of Things and Cloud.