Abstract
Security is a paramount concern in Wireless Mesh Networks (WMN) and also one of the core components in making WMNs successful and an enabler into different markets. A core challenge in securing the WMN is the large number of communication links over the air; as each mesh device may be mobile and deployed outdoors, each mesh link presents an exposure and vulnerability into the mesh network. These vulnerabilities are partially due to the structure of WMNs and cannot be removed easily. Security procedures present in 802.11s only take care of the potential security attacks in network association and secure link establishment. Ensuring that the routing protocol is secure is also not specified in the standard. In this paper we analyze the security problems in WMN and present few promising open research challenges which need immediate attention.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
IEEE STD 802.11-2007. Wireless Local Area Networks, IEEE, WLAN Standard (2002)
Xuyang, D., Mingyu, F., Xiaojun, L., Dayong, Z., Jiahao, W.: Multi-path based secure communication in wireless mesh networks. Journal of Systems Engineering and Electronics 18(4), 818–824 (2007)
Zhang, W., Rao, R., Cao, G., Kesidis, G.: Secure Routing in Ad Hoc Networks and a Related Intrusion Detection Problem. In: Proceedings of IEEE Military Communications Conference, October 2003, vol. 2, pp. 735–740 (2003)
Bahr, M.: Update on the Hybrid Wireless Mesh Protocol of IEEE 802.11s. In: Proc. in IEEE International Conference on Mobile Adhoc and Sensor Systems, October 8-11, pp. 1–6 (2007)
Wu, B., Chen, J., Wu, J., Cardei, M.: A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks. In: Wireless Network Security. Network Theory and Applications, vol. 17. Springer, Heidelberg (2006)
Cheung, S.: An Efficient Message Authentication Scheme for Link State Routing. In: 13th Annual Computer Security Applications Conference, pp. 90–98 (1997)
Blunk, L., Vollbrecht, J., Aboba, B., Carlson, J., Levkowetz, H.: Extensible Authentication Protocol (EAP). Internet Draft draft-ietf-eap-rfc2284bis-06.txt (September 29, 2003)
Heffernan, A.: Protection of BGP Sessions via the TCP MD5 Signature Option. RFC 2385 (August 1998)
Batina, L., Mentens, N., Sakiyama, K., Preneel, B., Verbauwhede, I.: Low-cost Elliptic Curve Cryptography for Wireless Sensor Networks. In: 3rd European Workshop on Security and Privacy in Ad hoc and Sensor Networks, pp. 6–17 (2006)
Basagni, S., Herrin, K., Rosti, E., Bruschi, D.: Secure Pebblenets. In: Proceedings of the Second Symposium on Mobile Ad Hoc Networking and Computing, October 2001, pp. 156–163 (2001)
Hu, Y.-C., Johnson, D.B., Perrig, A.: Secure Efficient Distance Vector Routing in Mobile Wireless Ad Hoc Networks. In: Fourth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002), June 2002, pp. 3–13 (2002)
Zapata, M., Asokan, N.: Securing Ad hoc Routing Protocols. In: ACM Workshop on Wireless Secuirty (WiSe) (September 2002)
Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: A Secure Protocol for Adhoc Networks. In: IEEE International Conference on Network Protocols, ICNP (2002)
Hu, Y., Perrig, A., Johnson, D.: Ariadne: A Secure On-demand Routing Protocol for Ad hoc Networks. In: ACM Annual International Conference on Mobile Computing and Networking (MOBICOM) (September 2002)
Hu, Y.C., Johnson, D.B., Perrig, A.: Packet leashes: A defense against wormhole attacks in wireless networks. In: Proc. IEEE INFOCOM 2003, March/April 2003, vol. 3, pp. 1976–1986 (2003)
Glass, S., Portmann, M., villipuram: Securing Wireless Mesh Networks, pp. 1089–7801. IEEE Computer Society, Los Alamitos (2008)
IEEE Std 802.11i/D4.1, Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Medium Access Control (MAC) Security Enhancements (2003)
Joint SEE-Mesh/Wi-Mesh Proposal to 802.11 TGs (2006)
Luo, H., Zerfos, P., Kong, J., Lu, S., Zhang, L.: Self-securing ad hoc wireless networks. In: Proc. IEEE ISCC 2002, July 2002, pp. 567–574 (2002)
Zhang, W., Das, S., Liu, Y.: A trust based framework for secure data aggregation in wireless sensor networks. In: Proc. IEEE SECON 2006, September 2006, pp. 60–69 (2006)
Tsakountakis, A., Kambourak, g., Gritzalis, S.: Towards effective Wireless Intrusion Detection in IEEE 802.11i. In: Proc. of Third International Workshop on Security Privacy and Trust in Pervasive and Uniquitous Computing, IEEE SecPerU (2007)
Zhang, Y., Lee, W., Huang, Y.: Intrusion Detection Techniques for Mobile Wireless Networks. ACM/Kluwer Wireless Networks Journal (ACM WINET) 9(5) (September 2003)
Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In: Proceeding of the Sixth Annual International Conference on Mobile Computing and Networking (MOBICOM), Boston, pp. 255–265 (2000)
Wua, T.-W., Hsieh, H.-Y.: Interworking wireless mesh networks: Problems, performance characterization, and perspectives. National Taiwan University, Journal Parallel Distributed Computing 68, 348–360 (2008)
Gerkis: A Survey of Wireless Mesh Networking Security Technology and Threats, SANS Institute InfoSec Reading Room (September 2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Divya, Kumar, S. (2010). Security Challenges in Multihop Wireless Mesh Networks–A Survey. In: Weerasinghe, D. (eds) Information Security and Digital Forensics. ISDF 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 41. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11530-1_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-11530-1_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-11529-5
Online ISBN: 978-3-642-11530-1
eBook Packages: Computer ScienceComputer Science (R0)