Secure Routing for Wireless Mesh Networks

This paper describes a Security Enhanced AODV routing protocol for wireless mesh networks (SEAODV). SEAODV employs Blom's key pre-distribution scheme to compute the pairwise transient key (PTK) through the flooding of enhanced HELLO message and subsequently uses the established PTK to distribute the group transient key (GTK). PTK and GTK are used for authenticating unicast and broadcast routing messages respectively. In wireless mesh networks, a unique PTK is shared by each pair of nodes, while GTK is shared secretly between the node and all its one-hop neighbors. A message authentication code (MAC) is attached as the extension to the original AODV routing message to guarantee the message's authenticity and integrity in a hop-by-hop fashion. Security analysis and performance evaluation show that SEAODV is more effective in preventing identified routing attacks and outperforms ARAN and SAODV in terms of computation cost and route acquisition latency.

[1]  Yunghsiang Sam Han,et al.  A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.

[2]  Marco Conti,et al.  Mesh networks: commodity multihop ad hoc networks , 2005, IEEE Communications Magazine.

[3]  Ian F. Akyildiz,et al.  Wireless mesh networks: a survey , 2005, Comput. Networks.

[4]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[5]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[6]  Michael Bahr,et al.  Proposed routing for IEEE 802.11s WLAN mesh networks , 2006, WICON '06.

[7]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[8]  Stefan Schlott,et al.  Securing ad hoc routing protocols , 2004, Proceedings. 30th Euromicro Conference, 2004..

[9]  Mihail L. Sichitiu WIRELESS MESH NETWORKS : OPPORTUNITIES AND CHALLENGES , 2005 .

[10]  Xiangpeng Jing,et al.  Energy-Aware Algorithms for AODV in Ad Hoc Networks , .

[11]  Men Long,et al.  Energy-efficient and intrusion-resilient authentication for ubiquitous access to factory floor information , 2006, IEEE Transactions on Industrial Informatics.

[12]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[13]  Hossam S. Hassanein,et al.  Routing with load balancing in wireless Ad hoc networks , 2001, MSWIM '01.

[14]  Shouhuai Xu,et al.  LHAP: a lightweight hop-by-hop authentication protocol for ad-hoc networks , 2003, 23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings..

[15]  Ran Canetti,et al.  Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[16]  I.D. Chakeres,et al.  The utility of hello messages for determining link connectivity , 2002, The 5th International Symposium on Wireless Personal Multimedia Communications.

[17]  Choong Seon Hong,et al.  A Secure Hybrid Wireless Mesh Protocol for 802.11s Mesh Network , 2008, ICCSA.

[18]  Rolf Blom,et al.  An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.

[19]  Vincent W. S. Wong,et al.  Experimental comparisons between SAODV and AODV routing protocols , 2005, WMuNeP '05.