Skip to main content

Security Challenges in Multihop Wireless Mesh Networks–A Survey

  • Conference paper
Information Security and Digital Forensics (ISDF 2009)

Abstract

Security is a paramount concern in Wireless Mesh Networks (WMN) and also one of the core components in making WMNs successful and an enabler into different markets. A core challenge in securing the WMN is the large number of communication links over the air; as each mesh device may be mobile and deployed outdoors, each mesh link presents an exposure and vulnerability into the mesh network. These vulnerabilities are partially due to the structure of WMNs and cannot be removed easily. Security procedures present in 802.11s only take care of the potential security attacks in network association and secure link establishment. Ensuring that the routing protocol is secure is also not specified in the standard. In this paper we analyze the security problems in WMN and present few promising open research challenges which need immediate attention.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. http://www.ietf.org/html.charters/manet-charter.html

  2. IEEE STD 802.11-2007. Wireless Local Area Networks, IEEE, WLAN Standard (2002)

    Google Scholar 

  3. Xuyang, D., Mingyu, F., Xiaojun, L., Dayong, Z., Jiahao, W.: Multi-path based secure communication in wireless mesh networks. Journal of Systems Engineering and Electronics 18(4), 818–824 (2007)

    Article  Google Scholar 

  4. Zhang, W., Rao, R., Cao, G., Kesidis, G.: Secure Routing in Ad Hoc Networks and a Related Intrusion Detection Problem. In: Proceedings of IEEE Military Communications Conference, October 2003, vol. 2, pp. 735–740 (2003)

    Google Scholar 

  5. Bahr, M.: Update on the Hybrid Wireless Mesh Protocol of IEEE 802.11s. In: Proc. in IEEE International Conference on Mobile Adhoc and Sensor Systems, October 8-11, pp. 1–6 (2007)

    Google Scholar 

  6. Wu, B., Chen, J., Wu, J., Cardei, M.: A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks. In: Wireless Network Security. Network Theory and Applications, vol. 17. Springer, Heidelberg (2006)

    Google Scholar 

  7. Cheung, S.: An Efficient Message Authentication Scheme for Link State Routing. In: 13th Annual Computer Security Applications Conference, pp. 90–98 (1997)

    Google Scholar 

  8. Blunk, L., Vollbrecht, J., Aboba, B., Carlson, J., Levkowetz, H.: Extensible Authentication Protocol (EAP). Internet Draft draft-ietf-eap-rfc2284bis-06.txt (September 29, 2003)

    Google Scholar 

  9. Heffernan, A.: Protection of BGP Sessions via the TCP MD5 Signature Option. RFC 2385 (August 1998)

    Google Scholar 

  10. Batina, L., Mentens, N., Sakiyama, K., Preneel, B., Verbauwhede, I.: Low-cost Elliptic Curve Cryptography for Wireless Sensor Networks. In: 3rd European Workshop on Security and Privacy in Ad hoc and Sensor Networks, pp. 6–17 (2006)

    Google Scholar 

  11. Basagni, S., Herrin, K., Rosti, E., Bruschi, D.: Secure Pebblenets. In: Proceedings of the Second Symposium on Mobile Ad Hoc Networking and Computing, October 2001, pp. 156–163 (2001)

    Google Scholar 

  12. Hu, Y.-C., Johnson, D.B., Perrig, A.: Secure Efficient Distance Vector Routing in Mobile Wireless Ad Hoc Networks. In: Fourth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002), June 2002, pp. 3–13 (2002)

    Google Scholar 

  13. Zapata, M., Asokan, N.: Securing Ad hoc Routing Protocols. In: ACM Workshop on Wireless Secuirty (WiSe) (September 2002)

    Google Scholar 

  14. Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: A Secure Protocol for Adhoc Networks. In: IEEE International Conference on Network Protocols, ICNP (2002)

    Google Scholar 

  15. Hu, Y., Perrig, A., Johnson, D.: Ariadne: A Secure On-demand Routing Protocol for Ad hoc Networks. In: ACM Annual International Conference on Mobile Computing and Networking (MOBICOM) (September 2002)

    Google Scholar 

  16. Hu, Y.C., Johnson, D.B., Perrig, A.: Packet leashes: A defense against wormhole attacks in wireless networks. In: Proc. IEEE INFOCOM 2003, March/April 2003, vol. 3, pp. 1976–1986 (2003)

    Google Scholar 

  17. Glass, S., Portmann, M., villipuram: Securing Wireless Mesh Networks, pp. 1089–7801. IEEE Computer Society, Los Alamitos (2008)

    Google Scholar 

  18. IEEE Std 802.11i/D4.1, Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Medium Access Control (MAC) Security Enhancements (2003)

    Google Scholar 

  19. Joint SEE-Mesh/Wi-Mesh Proposal to 802.11 TGs (2006)

    Google Scholar 

  20. Luo, H., Zerfos, P., Kong, J., Lu, S., Zhang, L.: Self-securing ad hoc wireless networks. In: Proc. IEEE ISCC 2002, July 2002, pp. 567–574 (2002)

    Google Scholar 

  21. Zhang, W., Das, S., Liu, Y.: A trust based framework for secure data aggregation in wireless sensor networks. In: Proc. IEEE SECON 2006, September 2006, pp. 60–69 (2006)

    Google Scholar 

  22. Tsakountakis, A., Kambourak, g., Gritzalis, S.: Towards effective Wireless Intrusion Detection in IEEE 802.11i. In: Proc. of Third International Workshop on Security Privacy and Trust in Pervasive and Uniquitous Computing, IEEE SecPerU (2007)

    Google Scholar 

  23. Zhang, Y., Lee, W., Huang, Y.: Intrusion Detection Techniques for Mobile Wireless Networks. ACM/Kluwer Wireless Networks Journal (ACM WINET) 9(5) (September 2003)

    Google Scholar 

  24. Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In: Proceeding of the Sixth Annual International Conference on Mobile Computing and Networking (MOBICOM), Boston, pp. 255–265 (2000)

    Google Scholar 

  25. Wua, T.-W., Hsieh, H.-Y.: Interworking wireless mesh networks: Problems, performance characterization, and perspectives. National Taiwan University, Journal Parallel Distributed Computing 68, 348–360 (2008)

    Article  MATH  Google Scholar 

  26. Gerkis: A Survey of Wireless Mesh Networking Security Technology and Threats, SANS Institute InfoSec Reading Room (September 2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Divya, Kumar, S. (2010). Security Challenges in Multihop Wireless Mesh Networks–A Survey. In: Weerasinghe, D. (eds) Information Security and Digital Forensics. ISDF 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 41. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11530-1_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-11530-1_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-11529-5

  • Online ISBN: 978-3-642-11530-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics