Protection Based on Neighborhood-Trust in Clustered Wireless Mesh Networks

Wireless Mesh Network (WMN) is unquestionably an interesting technology addition in wireless communication networks because of its self-organizing, self-healing and reliability dimensions. However, possible misuse or hijacking of these networks by adversaries make them highly vulnerable. In this paper, we provide a protection mechanism based on neighborhood trust to gain required security and identification privacy in a clustered WMN. Our approach renders a lightweight protection against security vulnerabilities using hash chains and does not require any trusted authority.

[1]  Salil S. Kanhere,et al.  Securing Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[2]  Choong Seon Hong,et al.  Preserving Identity Privacy in Wireless Mesh Networks , 2008, 2008 International Conference on Information Networking.

[3]  Sushil Jajodia,et al.  Practical broadcast authentication in sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[4]  Mesut Günes,et al.  Neighborhood Nodes Collaboration to support QoS routing in Wireless Mesh Networks , 2009, 2009 IEEE Symposium on Computers and Communications.

[5]  Choong Seon Hong,et al.  Misbehavior Detection in Wireless Mesh Networks , 2008, 2008 10th International Conference on Advanced Communication Technology.

[6]  Dawn Song,et al.  The TESLA Broadcast Authentication Protocol , 2002 .

[7]  Muhammad Shoaib Siddiqui,et al.  Security Issues in Wireless Mesh Networks , 2007, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07).

[8]  Shouhuai Xu,et al.  LHAP: a lightweight hop-by-hop authentication protocol for ad-hoc networks , 2003, 23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings..

[9]  T. Rajendran,et al.  Secure anonymous routing in ad hoc networks , 2008, Bangalore Compute Conf..

[10]  Ki-Hyung Kim,et al.  Survey of Security Requirements, Attacks and Network Integration in Wireless Mesh Networks , 2008, FCST.

[11]  Guiling Wang,et al.  Lightweight and Compromise-Resilient Message Authentication in Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[12]  Udo W. Pooch,et al.  A lightweight authentication protocol for mobile ad hoc networks , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[13]  Ameer Ahmed Abbasi,et al.  A survey on clustering algorithms for wireless sensor networks , 2007, Comput. Commun..

[14]  Wenjing Lou,et al.  A Sophisticated Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems.

[15]  Jean-Pierre Hubaux,et al.  Securing wireless mesh networks , 2006, IEEE Wireless Communications.

[16]  Guangsong Li An Identity-Based Security Architecture for Wireless Mesh Networks , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).