Developing Security Solutions for Wireless Mesh Enterprise Networks

Our study on the deployment topology and communication characteristics of wireless mesh enterprise networks (WMENs) leads to three critical security challenges: (a) deployment of network devices are not planar, rather devices are deployed over three-dimensional space, (b) message generated/received by a mesh client traverses through mesh routers in a multi-hop fashion, and (c) mesh clients being mostly mobile in nature may result in misbehaving or spurious during communications. We address these challenges for WMENs that may be a small network within an office or a medium-size network for all offices in an entire building, or a large scale network among offices in multiple buildings. We develop a matrix key distribution technique that perfectly suits the network topology. A session key establishment protocol is presented to achieve the client-router and router-router communication security. Finally, a misbehaving client detection algorithm is developed based on the communication history. We analyze and evaluate the performance to show the suitability of our proposed security solutions.

[1]  Jean Frédéric Myoupo,et al.  A basis for 3-D cellular networks , 2001, Proceedings 15th International Conference on Information Networking.

[2]  Yang Xiao,et al.  Underwater Acoustic Sensor Networks , 2009 .

[3]  Radha Poovendran,et al.  Modeling adaptive node capture attacks in multi-hop wireless networks , 2007, Ad Hoc Networks.

[4]  Dario Pompili,et al.  Underwater acoustic sensor networks: research challenges , 2005, Ad Hoc Networks.

[5]  Vahab S. Mirrokni,et al.  Fault-Tolerant and 3-Dimensional Distributed Topology Control Algorithms in Wireless Multi-hop Networks , 2006, Wirel. Networks.

[6]  D.P. Agrawal,et al.  Active Cache Based Defense against DoS Attacks in Wireless Mesh Network , 2007, 2007 2nd International Symposium on Wireless Pervasive Computing.

[7]  Vlady Ravelomanana,et al.  Extremal properties of three-dimensional sensor networks with applications , 2004, IEEE Transactions on Mobile Computing.

[8]  Ninghui Li,et al.  Achieving privacy in mesh networks , 2006, SASN '06.

[9]  Li Gong,et al.  A matrix key-distribution scheme , 2005, Journal of Cryptology.

[10]  Yuan Xue,et al.  Preserving traffic privacy in wireless mesh networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[11]  Tarek F. Abdelzaher,et al.  A Scalable Logical Coordinates Framework for Routing in Wireless Sensor Networks , 2004, RTSS.

[12]  C. Decayeux,et al.  A new model for 3D cellular mobile networks , 2004, Third International Symposium on Parallel and Distributed Computing/Third International Workshop on Algorithms, Models and Tools for Parallel Computing on Heterogeneous Networks.

[13]  Zygmunt J. Haas,et al.  Coverage and connectivity in three-dimensional networks , 2006, MobiCom '06.

[14]  Ian F. Akyildiz,et al.  Wireless mesh networks: a survey , 2005, Comput. Networks.

[15]  Yuguang Fang,et al.  ARSA: An Attack-Resilient Security Architecture for Multihop Wireless Mesh Networks , 2006, IEEE Journal on Selected Areas in Communications.

[16]  P. R. Kumar,et al.  Internets in the sky: The capacity of three-dimensional wireless networks , 2001, Commun. Inf. Syst..

[17]  Jean-Pierre Hubaux,et al.  Securing wireless mesh networks , 2006, IEEE Wireless Communications.