SRPM: Secure Routing Protocol for IEEE 802.11 Infrastructure Based Wireless Mesh Networks

Infrastructure based IEEE 802.11 wireless mesh networks (WMNs) are new paradigm of low cost broadband technology. The large scale city-wide community-based coverage and multi-hop architecture are such characteristics which are vulnerable to network layer threats, and the adversary can exploit them for large scale degradation of the broadband services. So far many secure routing protocols have been proposed for ad-hoc networks, however, due to the different nature and characteristics; they cannot perform well in a WMN environment. In this paper, we discuss the limitations and challenges as well as propose an exclusive secure routing protocol for an infrastructure based wireless mesh (SRPM) network. SRPM is robust against a variety of multi-hop threats and performs well over a range of scenarios we tested.

[1]  Jangeun Jun,et al.  MRP: Wireless mesh networks routing protocol , 2008, Comput. Commun..

[2]  John C. Bicket,et al.  SrcRR : A High Throughput Routing Protocol for 802 . 11 Mesh Networks ( DRAFT ) , .

[3]  Fei Xing,et al.  Understanding Dynamic Denial of Service Attacks in Mobile Ad Hoc Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[4]  Yuan Xue,et al.  Optimal Routing for Wireless Mesh Networks With Dynamic Traffic Demand , 2008, Mob. Networks Appl..

[5]  Victor C. M. Leung,et al.  Secure Routing for Mobile Ad Hoc Networks , 2006 .

[6]  H. T. Mouftah,et al.  Wireless mesh networking , 2005, MSWiM '05.

[7]  Starsky H. Y. Wong,et al.  ROMER : Resilient Opportunistic Mesh Routing for Wireless Mesh Networks , 2005 .

[8]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.

[9]  Cristina Nita-Rotaru,et al.  JANUS: A Framework for Scalable and Secure Routing in Hybrid Wireless Networks , 2009, IEEE Transactions on Dependable and Secure Computing.

[10]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[11]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[12]  Sun Choi,et al.  WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).

[13]  Jaydip Sen,et al.  Secure Routing in Wireless Mesh Networks , 2011, ArXiv.

[14]  Lillykutty Jacob,et al.  A Secure Intra-domain Routing Protocol for Wireless Mesh Networks , 2007, ICISS.

[15]  Dijkstra Dijk THE BELLMAN-FORD ALGORITHM AND “DISTRIBUTED BELLMAN-FORD” , 2006 .

[16]  Martin May,et al.  Routing Packets into Wireless Mesh Networks , 2007 .

[17]  D.P. Agrawal,et al.  Active Cache Based Defense against DoS Attacks in Wireless Mesh Network , 2007, 2007 2nd International Symposium on Wireless Pervasive Computing.

[18]  Stefan Savage,et al.  802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.

[19]  Jack W. Tsai,et al.  A Review of Multipath Routing Protocols : From Wireless Ad Hoc to Mesh Networks , 2006 .

[20]  Syed Obaid Amin,et al.  MHRP: A Secure Multi-Path Hybrid Routing Protocol for Wireless Mesh Network , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[21]  Ian F. Akyildiz,et al.  A survey on wireless mesh networks , 2005, IEEE Communications Magazine.

[22]  Baruch Awerbuch,et al.  An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.

[23]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[24]  Melody Moh,et al.  A Delay-bounded Multi-Channel Routing Protocol for Wireless Mesh Networks using Multiple Token Rings: Extended Summary , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.

[25]  QUTdN QeO,et al.  Random early detection gateways for congestion avoidance , 1993, TNET.

[26]  Yi Pan,et al.  Vulnerabilities and security enhancements for the IEEE 802.11 WLANs , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[27]  Brian L. Mark,et al.  Byzantine robust trust establishment for mobile ad hoc networks , 2007, Telecommun. Syst..

[28]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[29]  Charles E. Perkins,et al.  Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.

[30]  Massimo Bernaschi,et al.  Access points vulnerabilities to DoS attacks in 802.11 networks , 2008, Wirel. Networks.

[31]  Murat Yuksel,et al.  Orthogonal Rendezvous Routing Protocol for Wireless Mesh Networks , 2009, IEEE/ACM Transactions on Networking.

[32]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[33]  Martin May,et al.  HEAT: Scalable Routing in Wireless Mesh Networks Using Temperature Fields , 2007, 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[34]  Todd R. Andel,et al.  Surveying security analysis techniques in manet routing protocols , 2007, IEEE Communications Surveys & Tutorials.

[35]  Reza Curtmola,et al.  Secure Routing in Wireless Mesh Networks , 2011, Encyclopedia of Cryptography and Security.

[36]  Farhat Anwar,et al.  A Proposed QoS Multicast Routing Framework for Next-Generation Wireless Mesh Network , 2008 .

[37]  Mario Gerla,et al.  Enhancing TCP fairness in ad hoc wireless networks using neighborhood RED , 2003, MobiCom '03.

[38]  Raouf Boutaba,et al.  Routing protocols in wireless mesh networks: challenges and design considerations , 2006, Multimedia Tools and Applications.

[39]  Anupam Joshi,et al.  Secure Routing and Intrusion Detection in Ad Hoc Networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[40]  Mario Gerla,et al.  Global state routing: a new routing scheme for ad-hoc wireless networks , 1998, ICC '98. 1998 IEEE International Conference on Communications. Conference Record. Affiliated with SUPERCOMM'98 (Cat. No.98CH36220).

[41]  Myung J. Lee,et al.  A resource-efficient and scalable wireless mesh routing protocol , 2007, Ad Hoc Networks.

[42]  Kok-Keong Loo,et al.  Cloned Access Point Detection and Point Detection and Prevention Mechanism in IEEE 802.11 Wireless Mesh Networks , 2008 .

[43]  Tarik Taleb,et al.  Detecting and avoiding wormhole attacks in wireless ad hoc networks , 2008, IEEE Communications Magazine.

[44]  M.R. Shikh-Bahaei,et al.  Interference cancellation in W-CDMA cellular structures using statistical processing , 1999, Seamless Interconnection for Universal Services. Global Telecommunications Conference. GLOBECOM'99. (Cat. No.99CH37042).

[45]  Stefan Savage,et al.  Denial-of-Service Attacks : Real Vulnerabilities and Practical Solutions , 2003 .

[46]  Marius Portmann,et al.  HOVER: hybrid on-demand distance vector routing for wireless mesh networks , 2008, ACSC.

[47]  Elizabeth M. Belding-Royer,et al.  On the Design and Implementation of Infrastructure Mesh Networks , 2005 .