On Securing HWMP Using IBC

In this paper, we propose a security mechanisms for the Hybrid-Wireless-Mesh Protocol (HWMP). Our mechanisms is based on the Identity Based Crytography. The motivation behind using IBC is that it eliminates the need to verify the authenticity of public keys. We have implemented the IBC technique to secure control message in HWMP, namely RREQ and RREP. In these Control messages, we interested only by the mutable fields (i.e. fields that an changing during control packet exchange). Throuhg simulation, we have evaluted the performance of our security mechanism in terms of control overhead, and does not induce too much overhead compared to the original HWMP (i.e. without security).

[1]  Yih-Chun Hu,et al.  A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.

[2]  Josef Pieprzyk Topics in Cryptology - CT-RSA 2010, The Cryptographers' Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings , 2010, CT-RSA.

[3]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.

[4]  Lin Chen,et al.  SWAN: A Secured Watchdog for Ad Hoc Networks , 2006 .

[5]  Azman Osman Lim,et al.  IEEE 802.11s wireless mesh networks: Framework and challenges , 2008, Ad Hoc Networks.

[6]  Choong Seon Hong,et al.  SHWMP: A Secure Hybrid Wireless Mesh Protocol for IEEE 802.11s Wireless Mesh Networks , 2009, Trans. Comput. Sci..

[7]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[8]  Guangsong Li An Identity-Based Security Architecture for Wireless Mesh Networks , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).

[9]  Sajal K. Das,et al.  Security Issues in Wireless Mesh Networks , 2008 .

[10]  Martin E. Hellman,et al.  Hiding information and signatures in trapdoor knapsacks , 1978, IEEE Trans. Inf. Theory.

[11]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[12]  정우성,et al.  IEEE 802.11s 기반 무선랜 메쉬 네트워크 구현 및 성능 평가 , 2008 .

[13]  Florian Hess,et al.  Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.

[14]  Ran Canetti,et al.  Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[15]  Ian F. Akyildiz,et al.  Wireless mesh networks: a survey , 2005, Comput. Networks.

[16]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[17]  Gabriel Montenegro,et al.  Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses , 2002, NDSS.

[18]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.