A security architecture for attacks detection and authentication in wireless mesh networks

A wireless mesh network (WMN) consists of numerous mesh nodes. It provides effective wireless internet connectivity due to efficient network architecture where mobile end users are connected wirelessly, and higher levels are wired to avoid energy constraints, node failure, and other related issues. WMN functions efficiently in providing seamless internet access but is highly susceptible to security issues such as attack and validation failure. In Literature, there are very few works which address the attacks on both the mesh client and AP while providing authentication. This paper extends the existing work and develops a security architecture for authentication and attack detection in (SAAAD) WMN. It provides authentication through trusted routers and detect the cloned AP attack and internal attacks. Cloned AP attacks are detected by the gateways through checking the information of new joining AP against the AP database. Internal attacks are detected by the gateways using the opinions collected from mesh routers and directly observed trust values. Simulation results show that SAAAD provides better detection accuracy by reducing the computational and communication overheads.

[1]  Victor C. M. Leung,et al.  FADE: Forwarding Assessment Based Detection of Collaborative Grey Hole Attacks in WMNs , 2013, IEEE Transactions on Wireless Communications.

[2]  Tianhan Gao,et al.  Anonymous authentication scheme based on identity-based proxy group signature for wireless mesh network , 2016, EURASIP J. Wirel. Commun. Netw..

[3]  P. Yogesh,et al.  Privacy Based Optimal Routing in Wireless Mesh Networks , 2014 .

[4]  Hui Lin,et al.  PA-SHWMP: a privacy-aware secure hybrid wireless mesh protocol for IEEE 802.11s wireless mesh networks , 2012, EURASIP J. Wirel. Commun. Netw..

[5]  G. Akilarasu,et al.  Trust Based Authentication and Key Establishment for Secure Routing in WMN , 2014, KSII Trans. Internet Inf. Syst..

[6]  Cheng-Chi Lee,et al.  A New Ticket-Based Authentication Mechanism for Fast Handover in Mesh Network , 2016, PloS one.

[7]  Somanath Tripathy,et al.  WRSR: wormhole-resistant secure routing for wireless mesh networks , 2013, EURASIP J. Wirel. Commun. Netw..

[8]  Mahdi Zareei,et al.  Joint Channel Assignment and Routing in Multiradio Multichannel Wireless Mesh Networks: Design Considerations and Approaches , 2016, J. Comput. Networks Commun..

[9]  Rajeev Kumar,et al.  Social Popularity based SVD++ Recommender System , 2014 .

[10]  Ankit Chaudhary,et al.  Product line development architectural model , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[11]  Navamani Thandava Meganathan,et al.  Privacy Preserved and Secured Reliable Routing Protocol for Wireless Mesh Networks , 2015, TheScientificWorldJournal.

[12]  Loukas Lazos,et al.  Selective jamming/dropping insider attacks in wireless mesh networks , 2011, IEEE Network.

[13]  Li Xu,et al.  Ticket-based handoff authentication for wireless mesh networks , 2014, Comput. Networks.

[14]  Antonio Capone,et al.  DSA-Mesh: a distributed security architecture for wireless mesh networks , 2011, Secur. Commun. Networks.

[15]  Joseph K. Liu,et al.  A Trust and Privacy Preserving Handover Authentication Protocol for Wireless Networks , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.

[16]  Neelakantan Pattathil Chandrasekharamenon,et al.  Connectivity analysis of one-dimensional vehicular ad hoc networks in fading channels , 2012, EURASIP Journal on Wireless Communications and Networking.

[17]  Fredrik Rusek,et al.  Iterative receivers with channel estimation for multi-user MIMO-OFDM: complexity and performance , 2012, EURASIP Journal on Wireless Communications and Networking.

[18]  Somanath Tripathy,et al.  Secure Multicast Routing Algorithm for Wireless Mesh Networks , 2016, J. Comput. Networks Commun..

[19]  Eryk Dutkiewicz,et al.  Cross-layer design with optimal dynamic gateway selection for wireless mesh networks , 2015, Comput. Commun..