PA-SHWMP: a privacy-aware secure hybrid wireless mesh protocol for IEEE 802.11s wireless mesh networks

Wireless mesh networks (WMNs) have emerged as a key technology for next generation wireless networks and provide a low-cost and convenient solution to the last-mile problem. Security and privacy issues are of paramount importance to WMNs for their wide deployment and for supporting service-oriented applications. Moreover, to support real-time services, WMNs must also be equipped with secure, reliable, and efficient routing protocols. Therefore, a number of research studies have been devoted to privacy-preserving routing protocols in WMNs. However, these studies cannot defend against inside attacks effectively, often take it for granted that every internal node is cooperative and trustworthy, and rarely consider dividing the user privacy information into different categories according to the security requirements. To address these issues, we propose a Privacy-Aware Secure Hybrid Wireless Mesh Protocol (PA-SHWMP), which combines a new dynamic reputation mechanism based on subject logic and uncertainty with the multi-level security technology. PA-SHWMP can defend against the internal attacks caused by compromised nodes and achieve stronger security and privacy protection while maintaining reasonable balances between security and performance. We analyze the PA-SHWMP protocol in terms of security, privacy, and performance. The simulation results show that the packet delivery ratio of the proposed PA-SHWMP becomes better than that of the existing HWMP and SHWMP protocols, when the number of malicious nodes and the percentage of lossy links increase. Moreover, the convergence time of PA-SHWMP is smaller than HWMP and SHWMP with any percentage of malicious mesh routers.

[1]  Yuan Xue,et al.  Preserving traffic privacy in wireless mesh networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[2]  Glenn Shafer,et al.  A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.

[3]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[4]  Jie Wu,et al.  Uncertainty Modeling and Reduction in MANETs , 2010, IEEE Transactions on Mobile Computing.

[5]  Celia Li,et al.  Secure Routing for Wireless Mesh Networks , 2011, Int. J. Netw. Secur..

[6]  Malur K. Sundareshan,et al.  A Model for Multilevel Security in Computer Networks , 1990, IEEE Trans. Software Eng..

[7]  Richard M. Fujimoto,et al.  Network Simulation , 2006, Network Simulation.

[8]  Atam P. Dhawan,et al.  MOSAR: A Secured On-demand Routing Protocol for Mobile Multilevel Ad Hoc Networks , 2010, International Journal of Network Security.

[9]  Ninghui Li,et al.  Achieving privacy in mesh networks , 2006, SASN '06.

[10]  Jaydip Sen,et al.  An Efficient and User Privacy-Preserving Routing Protocol for Wireless Mesh Networks , 2011, Scalable Comput. Pract. Exp..

[11]  Wenjing Lou,et al.  Security, privacy, and accountability in wireless access networks , 2009, IEEE Wireless Communications.

[12]  Bo Zhu,et al.  Anonymous User Communication for Privacy Protection in Wireless Metropolitan Mesh Networks , 2010, IEEE Transactions on Vehicular Technology.

[13]  Wenjing Lou,et al.  PEACE: A Novel Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks , 2010, IEEE Transactions on Parallel and Distributed Systems.

[14]  Audun Jøsang,et al.  Trust network analysis with subjective logic , 2006, ACSC.

[15]  Yong Zhang,et al.  A Novel Reputation Computation Model Based on Subjective Logic for Mobile Ad Hoc Networks , 2009, 2009 Third International Conference on Network and System Security.

[16]  Srdjan Capkun,et al.  Secure and Privacy-Preserving Communication in Hybrid Ad Hoc Networks , 2004 .

[17]  Sadeq Ali Makram,et al.  Protection Based on Neighborhood-Trust in Clustered Wireless Mesh Networks , 2009, 2009 Third International Conference on Next Generation Mobile Applications, Services and Technologies.

[18]  James C. Browne,et al.  Using uncertainty in reputation methods to enforce cooperation in ad-hoc networks , 2006, WiSe '06.

[19]  Choong Seon Hong,et al.  SHWMP: A Secure Hybrid Wireless Mesh Protocol for IEEE 802.11s Wireless Mesh Networks , 2009, Trans. Comput. Sci..

[20]  Jonathan Loo,et al.  SRPM: Secure Routing Protocol for IEEE 802.11 Infrastructure Based Wireless Mesh Networks , 2010, Journal of Network and Systems Management.

[21]  Sajal K. Das,et al.  Privacy preservation in wireless sensor networks: A state-of-the-art survey , 2009, Ad Hoc Networks.

[22]  Kang G. Shin,et al.  On accurate measurement of link quality in multi-hop wireless mesh networks , 2006, MobiCom '06.

[23]  Choong Seon Hong,et al.  A Secure Hybrid Wireless Mesh Protocol for 802.11s Mesh Network , 2008, ICCSA.

[24]  Ian F. Akyildiz,et al.  Wireless mesh networks: a survey , 2005, Comput. Networks.