On Reduced Computational Cost, Efficient and Secure Routing (ESR) for Wireless Mesh Network☆

Abstract Different next generation wireless network technologies are developed to provide better services to the community. WMN is considered as a novel wireless network archetype as it does not rely on any of the fixed infrastructures. However, there exist some challenging issues in designing of the WMN such as vulnerability towards malicious attacks and communication cost. Several routing protocols i.e. ARAN, SAODV or TAODV have been proposed but lead to above mentioned drawbacks. In this paper, a novel approach for Secure Routing Protocol is proposed which overcomes drawbacks like- high communication cost, man-in-middle attack, wormhole attack and rushing attack. Furthermore, the approach is proved by showing the proper simulation results.

[1]  Yi Mu,et al.  Securing wireless mesh networks with ticket-based authentication , 2008, 2008 2nd International Conference on Signal Processing and Communication Systems.

[2]  Letha H. Etzkorn,et al.  Proceedings of the 42nd Annual Southeast Regional Conference, 2004, Huntsville, Alabama, USA, April 2-3, 2004 , 2004, ACM Southeast Regional Conference.

[3]  G. Padmavathi,et al.  A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.

[4]  Tomasz Imielinski,et al.  Mobile Computing , 1996 .

[5]  Elizabeth M. Belding-Royer,et al.  Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.

[6]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[7]  Jaydip Sen,et al.  Secure Routing in Wireless Mesh Networks , 2011, ArXiv.

[8]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[9]  G. S. Mamatha,et al.  Network Layer Attacks and Defense Mechanisms in MANETS- A Survey , 2010 .

[10]  Jaydip Sen,et al.  A mechanism for detection of gray hole attack in mobile Ad Hoc networks , 2007, 2007 6th International Conference on Information, Communications & Signal Processing.

[11]  C. Siva Ram Murthy,et al.  An Introduction to Wireless Mesh Networks , 2008 .

[12]  Ian F. Akyildiz,et al.  A survey on wireless mesh networks , 2005, IEEE Communications Magazine.

[13]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[14]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[15]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.