Cross Layer Secure and Resource-Aware On-Demand Routing Protocol for Hybrid Wireless Mesh Networks
- 515 Downloads
Secure routing is one of the challenges offered by hybrid wireless mesh networks (WMNs). Researcher are implementing different approaches for mesh routing, but still need more efforts in terms of security, efficiency, deployment and capability with different scenarios and applications. Cross layer secure and resource-aware on demand routing (CSROR) protocol for hybrid WMN is designed to ensure routing security and fulfil different applications specific requirements for multimedia delivery and real-time transmissions. CSROR selects an optimum route on the basis of route security taking in consideration the different cross layer parameters. CSROR is not only resource aware approach but also resilient to different packet dropping attacks. It is evaluated in diverse range of hostile hybrid WMN scenarios.
KeywordsRouting protocol Cross layer Wireless mesh networks Resource aware Security
Unable to display preview. Download preview PDF.
- 1.Aguayo, D., Bicket, J., & Morris, R. (2004). ScrRR: A high throughput routing protocol for 802.11 mesh networks.Google Scholar
- 3.Ali Ahmed, T. H. (2005). Modeling and simulation of routing protocol for ad hoc networks combing queuing network analysis and ANT colony algorithms. PhD Thesis, University of Duisburg Essen, April.Google Scholar
- 5.Baumann, R., Heimlicher, S., Lenders, V., & May, M. (2007). Routing packets into wireless mesh networks. In Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications. (WiMOB).Google Scholar
- 6.Baumann, R., Heimlicher, S., Lenders, V., & May, M. (2007). HEAT: Scalable routing in wireless mesh networks using temperature fields. In IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).Google Scholar
- 8.Carbunar, B., Ioannidis, I., & Nita-Rotaru, C. (2008). JANUS: A framework for scalable and secure routing in hybrid wireless networks. IEEE Transactions on Dependable and Secure Computing. doi: 10.1109/TDSC.2008.14.
- 9.Cheng, B.-N., Yuksel, M., & Kalyanaraman, S. (2006). Orthogonal rendezvous routing protocol for wireless mesh networks. In Proceedings of the 14th IEEE International Conference on Network Protocols (ICNP).Google Scholar
- 10.Choi, S., Kim, D., Lee, D., & Jung J. (2008). WAP: Wormhole attack prevention algorithm in mobile Ad hoc networks. In IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing.Google Scholar
- 12.De Couto, D. S. J., et al. (2003). A high-throughput path metric for multi-hop wireless routing. In Proceedings of 9th ACM International Conference on Mobile Computing and Networking (MobiCom’03). San Diego, CA, Sept.Google Scholar
- 14.Haas, Z. J. (1997). The routing algorithm for the reconfigurable wireless networks. In Proceedings of 6th International Conference on Universal Personal Communications ICUPC, 2, 562–566, Oct.Google Scholar
- 15.Hu, Y.-C., Perrig, A., & Johnson, D. B. (2003). Packet leashes: A defence against Wormhole attacks in wireless networks. In 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM).Google Scholar
- 16.Iiyas, M. (2002). The handbook of Ad hoc wireless networks. Boca Raton: CRC Press LLC, ISBN 0-84931332-5.Google Scholar
- 18.Kandikattu R., Jacob L. (2007) A secure intra-domain routing protocol for wireless mesh networks. Springer LNCS 4812: 37–50Google Scholar
- 19.Khan, S., Loo, K. K., Mast, N., & Naeem, T. (2010). SRPM: Secure routing protocol for IEEE 802.11 infrastructure based wireless mesh networks. Network and Systems Management, 18(2). doi: 10.1007/s10922-009-9143-3, June (in press).
- 20.Lin, D., Moh, T.-S., & Moh, M. (2006). A delay-bounded multi-channel routing protocol for wireless mesh networks using multiple token rings: extended summery. In Proceedings of 31st IEEE Conference on Local Computer Networks.Google Scholar
- 21.Manoj, B. S., Ananthapadmanabha, R., & Siva Ram Murthy, C., (2001). Link life based routing protocol for Ad hoc wireless networks. In Proceedings of 10th IEEE Int’l. Conf. Comp. Commun. (IC3N 2001), Oct.Google Scholar
- 22.Mir, S., Pirzada, A. A., & Portmann, M. (2008). HOVER: Hybrid on-demand distance vector routing for wireless mesh networks. In Proceedings of 31st Australasian Science Conference (ACSC).Google Scholar
- 23.Module 7, routing and congestion control, version 2 CSE IIT, Kharagpur. Available at http://nptel.iitm.ac.in. (Accessed Feb. 2009).
- 24.Perkins, C., & Bhagwat, P. (1994). Highly dynamic destination sequenced distance vector routing (DSDV) for mobile computers. In Proceedings of the ACM SIGCOMM.Google Scholar
- 25.Ramachandran, K. N., Buddhikot, M. M., Chandranmenon, G., Miller, S., B-Royer, E. M., & Almeroth, K. C. (2005). On the design and implementation of infrastructure mesh networks. In Proceedings of the IEEE Workshop on Wireless Mesh Networks (WiMesh).Google Scholar
- 26.Siddiqui, M. S., Amin, S. O., Kim, J. H., & Hong, C. S. (2007). MHRP: A secure multipath hybrid routing protocol for wireless mesh network. In IEEE Military Communication Conference (MILCOM) (pp. 1–7).Google Scholar
- 27.Tsai, J., & Moors, T. (2006). A review of multipath routing protocols: From wireless Ad Hoc to mesh networks. In Proceedings of ACoRN Early Career Researcher Workshop on Wireless Multihop Networking, Jul. 17–18.Google Scholar
- 30.Xing, F., & Wang, W. (2006). Understanding dynamic denial of service attack in mobile Ad hoc networks. In IEEE Military Communication Conference (MILCOM).Google Scholar
- 31.Yuan, Y., Yang, H., Wong, S. H. Y., Lu, S., & Arbaugh, W. (2005). ROMER: Resilient opportunistic mesh routing for wireless mesh networks. First IEEE Workshop on Wireless Mesh Networks (WiMesh).Google Scholar