Wireless Personal Communications

, Volume 62, Issue 1, pp 201–214 | Cite as

Cross Layer Secure and Resource-Aware On-Demand Routing Protocol for Hybrid Wireless Mesh Networks



Secure routing is one of the challenges offered by hybrid wireless mesh networks (WMNs). Researcher are implementing different approaches for mesh routing, but still need more efforts in terms of security, efficiency, deployment and capability with different scenarios and applications. Cross layer secure and resource-aware on demand routing (CSROR) protocol for hybrid WMN is designed to ensure routing security and fulfil different applications specific requirements for multimedia delivery and real-time transmissions. CSROR selects an optimum route on the basis of route security taking in consideration the different cross layer parameters. CSROR is not only resource aware approach but also resilient to different packet dropping attacks. It is evaluated in diverse range of hostile hybrid WMN scenarios.


Routing protocol Cross layer Wireless mesh networks Resource aware Security 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Aguayo, D., Bicket, J., & Morris, R. (2004). ScrRR: A high throughput routing protocol for 802.11 mesh networks.Google Scholar
  2. 2.
    Akyildiz I. F., Wang X. (2005) A survey on wireless mesh networks. IEEE Commun Mag 43(9): 23–30CrossRefGoogle Scholar
  3. 3.
    Ali Ahmed, T. H. (2005). Modeling and simulation of routing protocol for ad hoc networks combing queuing network analysis and ANT colony algorithms. PhD Thesis, University of Duisburg Essen, April.Google Scholar
  4. 4.
    Andel T.R., Yasinsac A. (2007) Surveying security analysis techniques in MANET routing protocols. IEEE Communications Surveys & Tutorial, 9(4): 70–84CrossRefGoogle Scholar
  5. 5.
    Baumann, R., Heimlicher, S., Lenders, V., & May, M. (2007). Routing packets into wireless mesh networks. In Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications. (WiMOB).Google Scholar
  6. 6.
    Baumann, R., Heimlicher, S., Lenders, V., & May, M. (2007). HEAT: Scalable routing in wireless mesh networks using temperature fields. In IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).Google Scholar
  7. 7.
    Bellman R. (1958) On a routing problem. Quarterly of Applied Mathematics 16(1): 87–90MathSciNetMATHGoogle Scholar
  8. 8.
    Carbunar, B., Ioannidis, I., & Nita-Rotaru, C. (2008). JANUS: A framework for scalable and secure routing in hybrid wireless networks. IEEE Transactions on Dependable and Secure Computing. doi: 10.1109/TDSC.2008.14.
  9. 9.
    Cheng, B.-N., Yuksel, M., & Kalyanaraman, S. (2006). Orthogonal rendezvous routing protocol for wireless mesh networks. In Proceedings of the 14th IEEE International Conference on Network Protocols (ICNP).Google Scholar
  10. 10.
    Choi, S., Kim, D., Lee, D., & Jung J. (2008). WAP: Wormhole attack prevention algorithm in mobile Ad hoc networks. In IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing.Google Scholar
  11. 11.
    Dai L., Xue Y., Chang B., Cao Y., Cui Y. (2008) Optimal routing for wireless mesh networks with dynamic traffic demand. Mobile Networks and Applications 13(1–2): 97–116CrossRefGoogle Scholar
  12. 12.
    De Couto, D. S. J., et al. (2003). A high-throughput path metric for multi-hop wireless routing. In Proceedings of 9th ACM International Conference on Mobile Computing and Networking (MobiCom’03). San Diego, CA, Sept.Google Scholar
  13. 13.
    Dijkstra E.W. (1959) A note on two problems in connexion with graphs. Numerische Mathematik , 1: 269–271MathSciNetMATHCrossRefGoogle Scholar
  14. 14.
    Haas, Z. J. (1997). The routing algorithm for the reconfigurable wireless networks. In Proceedings of 6th International Conference on Universal Personal Communications ICUPC, 2, 562–566, Oct.Google Scholar
  15. 15.
    Hu, Y.-C., Perrig, A., & Johnson, D. B. (2003). Packet leashes: A defence against Wormhole attacks in wireless networks. In 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM).Google Scholar
  16. 16.
    Iiyas, M. (2002). The handbook of Ad hoc wireless networks. Boca Raton: CRC Press LLC, ISBN 0-84931332-5.Google Scholar
  17. 17.
    Joa-Ng M., Lu I. T. (1999) A peer-to-peer zone-based two-level link state routing for mobile Ad hoc Networks. IEEE Journal on Selected Areas in Communications 17(8): 1415–1425CrossRefGoogle Scholar
  18. 18.
    Kandikattu R., Jacob L. (2007) A secure intra-domain routing protocol for wireless mesh networks. Springer LNCS 4812: 37–50Google Scholar
  19. 19.
    Khan, S., Loo, K. K., Mast, N., & Naeem, T. (2010). SRPM: Secure routing protocol for IEEE 802.11 infrastructure based wireless mesh networks. Network and Systems Management, 18(2). doi: 10.1007/s10922-009-9143-3, June (in press).
  20. 20.
    Lin, D., Moh, T.-S., & Moh, M. (2006). A delay-bounded multi-channel routing protocol for wireless mesh networks using multiple token rings: extended summery. In Proceedings of 31st IEEE Conference on Local Computer Networks.Google Scholar
  21. 21.
    Manoj, B. S., Ananthapadmanabha, R., & Siva Ram Murthy, C., (2001). Link life based routing protocol for Ad hoc wireless networks. In Proceedings of 10th IEEE Int’l. Conf. Comp. Commun. (IC3N 2001), Oct.Google Scholar
  22. 22.
    Mir, S., Pirzada, A. A., & Portmann, M. (2008). HOVER: Hybrid on-demand distance vector routing for wireless mesh networks. In Proceedings of 31st Australasian Science Conference (ACSC).Google Scholar
  23. 23.
    Module 7, routing and congestion control, version 2 CSE IIT, Kharagpur. Available at http://nptel.iitm.ac.in. (Accessed Feb. 2009).
  24. 24.
    Perkins, C., & Bhagwat, P. (1994). Highly dynamic destination sequenced distance vector routing (DSDV) for mobile computers. In Proceedings of the ACM SIGCOMM.Google Scholar
  25. 25.
    Ramachandran, K. N., Buddhikot, M. M., Chandranmenon, G., Miller, S., B-Royer, E. M., & Almeroth, K. C. (2005). On the design and implementation of infrastructure mesh networks. In Proceedings of the IEEE Workshop on Wireless Mesh Networks (WiMesh).Google Scholar
  26. 26.
    Siddiqui, M. S., Amin, S. O., Kim, J. H., & Hong, C. S. (2007). MHRP: A secure multipath hybrid routing protocol for wireless mesh network. In IEEE Military Communication Conference (MILCOM) (pp. 1–7).Google Scholar
  27. 27.
    Tsai, J., & Moors, T. (2006). A review of multipath routing protocols: From wireless Ad Hoc to mesh networks. In Proceedings of ACoRN Early Career Researcher Workshop on Wireless Multihop Networking, Jul. 17–18.Google Scholar
  28. 28.
    Waharte S., Boutaba R., Iraqi Y., Ishibashi B. (2006) Routing protocols in wireless mesh networks: Challenges and design considerations. Multimedia Tools and Applications 31(3): 285–303CrossRefGoogle Scholar
  29. 29.
    Wang Y., Attebury G., Ramamurthy B. (2006) A survey of security issues in wireless sensor networks. IEEE Communications Surveys and Tutorials, 8(2): 2–23CrossRefGoogle Scholar
  30. 30.
    Xing, F., & Wang, W. (2006). Understanding dynamic denial of service attack in mobile Ad hoc networks. In IEEE Military Communication Conference (MILCOM).Google Scholar
  31. 31.
    Yuan, Y., Yang, H., Wong, S. H. Y., Lu, S., & Arbaugh, W. (2005). ROMER: Resilient opportunistic mesh routing for wireless mesh networks. First IEEE Workshop on Wireless Mesh Networks (WiMesh).Google Scholar

Copyright information

© Springer Science+Business Media, LLC. 2010

Authors and Affiliations

  1. 1.School of Engineering and DesignBrunel UniversityUxbridgeUK
  2. 2.Kohat University of Science and Technology (KUST)KohatPakistan

Personalised recommendations