Date: 09 Jun 2010
Cross Layer Secure and Resource-Aware On-Demand Routing Protocol for Hybrid Wireless Mesh Networks
Rent the article at a discountRent now
* Final gross prices may vary according to local VAT.Get Access
Secure routing is one of the challenges offered by hybrid wireless mesh networks (WMNs). Researcher are implementing different approaches for mesh routing, but still need more efforts in terms of security, efficiency, deployment and capability with different scenarios and applications. Cross layer secure and resource-aware on demand routing (CSROR) protocol for hybrid WMN is designed to ensure routing security and fulfil different applications specific requirements for multimedia delivery and real-time transmissions. CSROR selects an optimum route on the basis of route security taking in consideration the different cross layer parameters. CSROR is not only resource aware approach but also resilient to different packet dropping attacks. It is evaluated in diverse range of hostile hybrid WMN scenarios.
Aguayo, D., Bicket, J., & Morris, R. (2004). ScrRR: A high throughput routing protocol for 802.11 mesh networks.
Akyildiz I. F., Wang X. (2005) A survey on wireless mesh networks. IEEE Commun Mag 43(9): 23–30CrossRef
Ali Ahmed, T. H. (2005). Modeling and simulation of routing protocol for ad hoc networks combing queuing network analysis and ANT colony algorithms. PhD Thesis, University of Duisburg Essen, April.
Andel T.R., Yasinsac A. (2007) Surveying security analysis techniques in MANET routing protocols. IEEE Communications Surveys & Tutorial, 9(4): 70–84CrossRef
Baumann, R., Heimlicher, S., Lenders, V., & May, M. (2007). Routing packets into wireless mesh networks. In Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications. (WiMOB).
Baumann, R., Heimlicher, S., Lenders, V., & May, M. (2007). HEAT: Scalable routing in wireless mesh networks using temperature fields. In IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).
Carbunar, B., Ioannidis, I., & Nita-Rotaru, C. (2008). JANUS: A framework for scalable and secure routing in hybrid wireless networks. IEEE Transactions on Dependable and Secure Computing. doi:10.1109/TDSC.2008.14.
Cheng, B.-N., Yuksel, M., & Kalyanaraman, S. (2006). Orthogonal rendezvous routing protocol for wireless mesh networks. In Proceedings of the 14th IEEE International Conference on Network Protocols (ICNP).
Choi, S., Kim, D., Lee, D., & Jung J. (2008). WAP: Wormhole attack prevention algorithm in mobile Ad hoc networks. In IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing.
Dai L., Xue Y., Chang B., Cao Y., Cui Y. (2008) Optimal routing for wireless mesh networks with dynamic traffic demand. Mobile Networks and Applications 13(1–2): 97–116CrossRef
De Couto, D. S. J., et al. (2003). A high-throughput path metric for multi-hop wireless routing. In Proceedings of 9th ACM International Conference on Mobile Computing and Networking (MobiCom’03). San Diego, CA, Sept.
Haas, Z. J. (1997). The routing algorithm for the reconfigurable wireless networks. In Proceedings of 6th International Conference on Universal Personal Communications ICUPC, 2, 562–566, Oct.
Hu, Y.-C., Perrig, A., & Johnson, D. B. (2003). Packet leashes: A defence against Wormhole attacks in wireless networks. In 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM).
Iiyas, M. (2002). The handbook of Ad hoc wireless networks. Boca Raton: CRC Press LLC, ISBN 0-84931332-5.
Joa-Ng M., Lu I. T. (1999) A peer-to-peer zone-based two-level link state routing for mobile Ad hoc Networks. IEEE Journal on Selected Areas in Communications 17(8): 1415–1425CrossRef
Kandikattu R., Jacob L. (2007) A secure intra-domain routing protocol for wireless mesh networks. Springer LNCS 4812: 37–50
Khan, S., Loo, K. K., Mast, N., & Naeem, T. (2010). SRPM: Secure routing protocol for IEEE 802.11 infrastructure based wireless mesh networks. Network and Systems Management, 18(2). doi:10.1007/s10922-009-9143-3, June (in press).
Lin, D., Moh, T.-S., & Moh, M. (2006). A delay-bounded multi-channel routing protocol for wireless mesh networks using multiple token rings: extended summery. In Proceedings of 31st IEEE Conference on Local Computer Networks.
Manoj, B. S., Ananthapadmanabha, R., & Siva Ram Murthy, C., (2001). Link life based routing protocol for Ad hoc wireless networks. In Proceedings of 10th IEEE Int’l. Conf. Comp. Commun. (IC3N 2001), Oct.
Mir, S., Pirzada, A. A., & Portmann, M. (2008). HOVER: Hybrid on-demand distance vector routing for wireless mesh networks. In Proceedings of 31st Australasian Science Conference (ACSC).
Module 7, routing and congestion control, version 2 CSE IIT, Kharagpur. Available at http://nptel.iitm.ac.in. (Accessed Feb. 2009).
Perkins, C., & Bhagwat, P. (1994). Highly dynamic destination sequenced distance vector routing (DSDV) for mobile computers. In Proceedings of the ACM SIGCOMM.
Ramachandran, K. N., Buddhikot, M. M., Chandranmenon, G., Miller, S., B-Royer, E. M., & Almeroth, K. C. (2005). On the design and implementation of infrastructure mesh networks. In Proceedings of the IEEE Workshop on Wireless Mesh Networks (WiMesh).
Siddiqui, M. S., Amin, S. O., Kim, J. H., & Hong, C. S. (2007). MHRP: A secure multipath hybrid routing protocol for wireless mesh network. In IEEE Military Communication Conference (MILCOM) (pp. 1–7).
Tsai, J., & Moors, T. (2006). A review of multipath routing protocols: From wireless Ad Hoc to mesh networks. In Proceedings of ACoRN Early Career Researcher Workshop on Wireless Multihop Networking, Jul. 17–18.
Waharte S., Boutaba R., Iraqi Y., Ishibashi B. (2006) Routing protocols in wireless mesh networks: Challenges and design considerations. Multimedia Tools and Applications 31(3): 285–303CrossRef
Wang Y., Attebury G., Ramamurthy B. (2006) A survey of security issues in wireless sensor networks. IEEE Communications Surveys and Tutorials, 8(2): 2–23CrossRef
Xing, F., & Wang, W. (2006). Understanding dynamic denial of service attack in mobile Ad hoc networks. In IEEE Military Communication Conference (MILCOM).
Yuan, Y., Yang, H., Wong, S. H. Y., Lu, S., & Arbaugh, W. (2005). ROMER: Resilient opportunistic mesh routing for wireless mesh networks. First IEEE Workshop on Wireless Mesh Networks (WiMesh).
- Cross Layer Secure and Resource-Aware On-Demand Routing Protocol for Hybrid Wireless Mesh Networks
Wireless Personal Communications
Volume 62, Issue 1 , pp 201-214
- Cover Date
- Print ISSN
- Online ISSN
- Springer US
- Additional Links
- Routing protocol
- Cross layer
- Wireless mesh networks
- Resource aware
- Industry Sectors