Skip to main content
Log in

Cross Layer Secure and Resource-Aware On-Demand Routing Protocol for Hybrid Wireless Mesh Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Secure routing is one of the challenges offered by hybrid wireless mesh networks (WMNs). Researcher are implementing different approaches for mesh routing, but still need more efforts in terms of security, efficiency, deployment and capability with different scenarios and applications. Cross layer secure and resource-aware on demand routing (CSROR) protocol for hybrid WMN is designed to ensure routing security and fulfil different applications specific requirements for multimedia delivery and real-time transmissions. CSROR selects an optimum route on the basis of route security taking in consideration the different cross layer parameters. CSROR is not only resource aware approach but also resilient to different packet dropping attacks. It is evaluated in diverse range of hostile hybrid WMN scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Aguayo, D., Bicket, J., & Morris, R. (2004). ScrRR: A high throughput routing protocol for 802.11 mesh networks.

  2. Akyildiz I. F., Wang X. (2005) A survey on wireless mesh networks. IEEE Commun Mag 43(9): 23–30

    Article  Google Scholar 

  3. Ali Ahmed, T. H. (2005). Modeling and simulation of routing protocol for ad hoc networks combing queuing network analysis and ANT colony algorithms. PhD Thesis, University of Duisburg Essen, April.

  4. Andel T.R., Yasinsac A. (2007) Surveying security analysis techniques in MANET routing protocols. IEEE Communications Surveys & Tutorial, 9(4): 70–84

    Article  Google Scholar 

  5. Baumann, R., Heimlicher, S., Lenders, V., & May, M. (2007). Routing packets into wireless mesh networks. In Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications. (WiMOB).

  6. Baumann, R., Heimlicher, S., Lenders, V., & May, M. (2007). HEAT: Scalable routing in wireless mesh networks using temperature fields. In IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).

  7. Bellman R. (1958) On a routing problem. Quarterly of Applied Mathematics 16(1): 87–90

    MathSciNet  MATH  Google Scholar 

  8. Carbunar, B., Ioannidis, I., & Nita-Rotaru, C. (2008). JANUS: A framework for scalable and secure routing in hybrid wireless networks. IEEE Transactions on Dependable and Secure Computing. doi:10.1109/TDSC.2008.14.

  9. Cheng, B.-N., Yuksel, M., & Kalyanaraman, S. (2006). Orthogonal rendezvous routing protocol for wireless mesh networks. In Proceedings of the 14th IEEE International Conference on Network Protocols (ICNP).

  10. Choi, S., Kim, D., Lee, D., & Jung J. (2008). WAP: Wormhole attack prevention algorithm in mobile Ad hoc networks. In IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing.

  11. Dai L., Xue Y., Chang B., Cao Y., Cui Y. (2008) Optimal routing for wireless mesh networks with dynamic traffic demand. Mobile Networks and Applications 13(1–2): 97–116

    Article  Google Scholar 

  12. De Couto, D. S. J., et al. (2003). A high-throughput path metric for multi-hop wireless routing. In Proceedings of 9th ACM International Conference on Mobile Computing and Networking (MobiCom’03). San Diego, CA, Sept.

  13. Dijkstra E.W. (1959) A note on two problems in connexion with graphs. Numerische Mathematik , 1: 269–271

    Article  MathSciNet  MATH  Google Scholar 

  14. Haas, Z. J. (1997). The routing algorithm for the reconfigurable wireless networks. In Proceedings of 6th International Conference on Universal Personal Communications ICUPC, 2, 562–566, Oct.

  15. Hu, Y.-C., Perrig, A., & Johnson, D. B. (2003). Packet leashes: A defence against Wormhole attacks in wireless networks. In 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM).

  16. Iiyas, M. (2002). The handbook of Ad hoc wireless networks. Boca Raton: CRC Press LLC, ISBN 0-84931332-5.

  17. Joa-Ng M., Lu I. T. (1999) A peer-to-peer zone-based two-level link state routing for mobile Ad hoc Networks. IEEE Journal on Selected Areas in Communications 17(8): 1415–1425

    Article  Google Scholar 

  18. Kandikattu R., Jacob L. (2007) A secure intra-domain routing protocol for wireless mesh networks. Springer LNCS 4812: 37–50

    Google Scholar 

  19. Khan, S., Loo, K. K., Mast, N., & Naeem, T. (2010). SRPM: Secure routing protocol for IEEE 802.11 infrastructure based wireless mesh networks. Network and Systems Management, 18(2). doi:10.1007/s10922-009-9143-3, June (in press).

  20. Lin, D., Moh, T.-S., & Moh, M. (2006). A delay-bounded multi-channel routing protocol for wireless mesh networks using multiple token rings: extended summery. In Proceedings of 31st IEEE Conference on Local Computer Networks.

  21. Manoj, B. S., Ananthapadmanabha, R., & Siva Ram Murthy, C., (2001). Link life based routing protocol for Ad hoc wireless networks. In Proceedings of 10th IEEE Int’l. Conf. Comp. Commun. (IC3N 2001), Oct.

  22. Mir, S., Pirzada, A. A., & Portmann, M. (2008). HOVER: Hybrid on-demand distance vector routing for wireless mesh networks. In Proceedings of 31st Australasian Science Conference (ACSC).

  23. Module 7, routing and congestion control, version 2 CSE IIT, Kharagpur. Available at http://nptel.iitm.ac.in. (Accessed Feb. 2009).

  24. Perkins, C., & Bhagwat, P. (1994). Highly dynamic destination sequenced distance vector routing (DSDV) for mobile computers. In Proceedings of the ACM SIGCOMM.

  25. Ramachandran, K. N., Buddhikot, M. M., Chandranmenon, G., Miller, S., B-Royer, E. M., & Almeroth, K. C. (2005). On the design and implementation of infrastructure mesh networks. In Proceedings of the IEEE Workshop on Wireless Mesh Networks (WiMesh).

  26. Siddiqui, M. S., Amin, S. O., Kim, J. H., & Hong, C. S. (2007). MHRP: A secure multipath hybrid routing protocol for wireless mesh network. In IEEE Military Communication Conference (MILCOM) (pp. 1–7).

  27. Tsai, J., & Moors, T. (2006). A review of multipath routing protocols: From wireless Ad Hoc to mesh networks. In Proceedings of ACoRN Early Career Researcher Workshop on Wireless Multihop Networking, Jul. 17–18.

  28. Waharte S., Boutaba R., Iraqi Y., Ishibashi B. (2006) Routing protocols in wireless mesh networks: Challenges and design considerations. Multimedia Tools and Applications 31(3): 285–303

    Article  Google Scholar 

  29. Wang Y., Attebury G., Ramamurthy B. (2006) A survey of security issues in wireless sensor networks. IEEE Communications Surveys and Tutorials, 8(2): 2–23

    Article  Google Scholar 

  30. Xing, F., & Wang, W. (2006). Understanding dynamic denial of service attack in mobile Ad hoc networks. In IEEE Military Communication Conference (MILCOM).

  31. Yuan, Y., Yang, H., Wong, S. H. Y., Lu, S., & Arbaugh, W. (2005). ROMER: Resilient opportunistic mesh routing for wireless mesh networks. First IEEE Workshop on Wireless Mesh Networks (WiMesh).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shafiullah Khan.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Khan, S., Loo, J. Cross Layer Secure and Resource-Aware On-Demand Routing Protocol for Hybrid Wireless Mesh Networks. Wireless Pers Commun 62, 201–214 (2012). https://doi.org/10.1007/s11277-010-0048-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-010-0048-y

Keywords

Navigation