Secured Identity Based Routing and privacy preservation in Wireless Mesh Networks

Wireless Mesh Networks (WMNs) have been expected to be the ultimate solution for the next decade wireless networking. The attractions of WMNs include easy set-up on the fly, off-the-shelf cost, flexible interoperability with other networks, and highly reliable connectivity. One main challenge in the design of these networks is their vulnerability to security attacks. The attacker will possibly be able to identify an ongoing communication session between any two network users by analyzing the network traffic pattern without knowing the user's identity information. To address these security risks, we propose a Secured Identity Based Routing (SIBR) scheme in which every node is assigned with the security cards for efficient authentication. The major goal of the proposed system is to reduce the number of levels at which an attack can take place by providing anonymity in routing. Our implementation results show that the proposed scheme increases the overall performance of the network substantially. Such a routing scheme enhances the privacy preservation of the end users. Our approach also protects against performance degradation even in the presence of malicious behavior.

[1]  Sajal K. Das,et al.  Security Issues in Wireless Mesh Networks , 2008 .

[2]  Syed Obaid Amin,et al.  MHRP: A Secure Multi-Path Hybrid Routing Protocol for Wireless Mesh Network , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[3]  Srdjan Capkun,et al.  Secure and Privacy-Preserving Communication in Hybrid Ad Hoc Networks , 2004 .

[4]  William Stallings,et al.  Network Security Essentials , 1999 .

[5]  Yuguang Fang,et al.  ARSA: An Attack-Resilient Security Architecture for Multihop Wireless Mesh Networks , 2006, IEEE Journal on Selected Areas in Communications.

[6]  Pin-Han Ho,et al.  TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks , 2008, IEEE Transactions on Wireless Communications.

[7]  Jean-Pierre Hubaux,et al.  Securing wireless mesh networks , 2006, IEEE Wireless Communications.

[8]  Robert H. Deng,et al.  A novel privacy preserving authentication and access control scheme for pervasive computing environments , 2006, IEEE Transactions on Vehicular Technology.

[9]  Yue Wu,et al.  Security in Wireless Mesh Networks: Challenges and Solutions , 2009, 2009 Sixth International Conference on Information Technology: New Generations.

[10]  Pin-Han Ho,et al.  A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks , 2008, Int. J. Secur. Networks.

[11]  Choong Seon Hong,et al.  An Efficient Mechanism for Network Management in Wireless Mesh Network , 2008, 2008 10th International Conference on Advanced Communication Technology.

[12]  Ray Hunt,et al.  A taxonomy of network and computer attacks , 2005, Comput. Secur..

[13]  Günther Horn,et al.  Authentication protocols for mobile network environment value-added services , 2002, IEEE Trans. Veh. Technol..

[14]  HuntRay,et al.  A taxonomy of network and computer attacks , 2005 .

[15]  Wenjing Lou,et al.  Privacy-enhanced, Attack-resilient Access Control in Pervasive Computing Environments with Optional Context Authentication Capability , 2007, Mob. Networks Appl..

[16]  William Stallings Network Security Essentials: Applications and Standards (3rd Edition) , 2006 .

[17]  Kui Ren,et al.  On Address Privacy in Mobile Ad Hoc Networks , 2009, Mob. Networks Appl..

[18]  Yuan Xue,et al.  Preserving traffic privacy in wireless mesh networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).