Advertisement

Wireless Personal Communications

, Volume 75, Issue 3, pp 1611–1633 | Cite as

A Role Based Privacy-Aware Secure Routing Protocol for Wireless Mesh Networks

  • Hui LinEmail author
  • Jia Hu
  • Jianfeng Ma
  • Li Xu
  • Atulya Nagar
Article

Abstract

Wireless Mesh Networks (WMNs) have drawn much attention for emerging as a promising technology to meet the challenges in next generation networks. Security and privacy protection have been the primary concerns in pushing towards the success of WMNs. There have been a multitude of solutions proposed to ensure the security of the routing protocol and the privacy information in WMNs. However, most of them are based on the assumptions that all nodes cooperate with routing and forwarding packets and the attacks are from outside. In order to defend against the internal attacks and to achieve better security and privacy protection, this paper proposes a role based privacy-aware secure routing protocol (RPASRP), which combines a new dynamic reputation mechanism with the role based multi-level security technology and a hierarchical key management protocol. Simulation results show that RPASRP implements the security and privacy protection against the inside attacks more effectively and efficiently and performs better than the classical hybrid wireless mesh protocol in terms of packet delivery ratio and average route length.

Keywords

Privacy protection Wireless mesh networks Secure routing HWMP 

Notes

Acknowledgments

This work is supported by the Program for Changjiang Scholars and Innovative Research Team in University (IRT1078), the Key Program of NSFC-Guangdong Union Foundation (U1135002), Major national S&T program (2011ZX03005-002), and the National Natural Science Foundation of China (61072080, 61202390, 61202452).

References

  1. 1.
    Akyildiz, I. F., Wang, X., & Wang, W. (2005). Wireless mesh networks: A survey. Computer Networks, 47(4), 445–487.CrossRefzbMATHGoogle Scholar
  2. 2.
    Lou, W., & Ren, K. (2009). Security, privacy, and accountability in wireless access networks. IEEE Wireless Communications Magazine, 16, 80–87.Google Scholar
  3. 3.
    Wang, X. (2009). A systematic security approach in wireless mesh networks. Doctor of Philosophy, Major: Computer Science. Iowa State University, Ames, Iowa.Google Scholar
  4. 4.
    Wan, Z., Ren, K., Zhu, B., Preneel, B., & Gu, M. (2010). Anonymous user communication for privacy protection in wireless metropolitan mesh networks. IEEE Transaction on Vehicular Technology, 59(2), 519–532.CrossRefGoogle Scholar
  5. 5.
    Li, N., Zhang, N., Das, S. K., & Thuraisingham, B. (2009). Privacy preservation in wireless sensor networks: A state-of-the-art survey. Ad Hoc Networks, 7, 1501–1514.CrossRefGoogle Scholar
  6. 6.
    Islam, Md S, Hamid, Md A, & Seon Hong, C. (2009). SHWMP: A secure hybrid wireless mesh protocol for IEEE 802.11s wireless mesh networks. Transactions on Computational Science VI, 5730, 95–114.CrossRefGoogle Scholar
  7. 7.
    IEEE 802.11s Task Group (2009). Draft amendment to standard for information technology telecommunications and information exchange between systems—LAN/MAN specific requirements—part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) specifications: Amendment: ESS Mesh Networking. IEEE P802.11s/D3.02, May.Google Scholar
  8. 8.
    Khan, S., Loo, K. K., Mast, N., & Naeem, T. (2010). SRPM: Secure routing protocol for IEEE 802.11 infrastructure based wireless mesh networks. Journal of Network and Systems Management, 18(2), 190–209.CrossRefGoogle Scholar
  9. 9.
    Liu, Y., et al. (2011). A novel reputation computation model based on subjective logic for mobile ad hoc networks. Future Generation Computer Systems, 27(5), 547–554.CrossRefGoogle Scholar
  10. 10.
    Kane, P., & Browne, P. C. (2006). Using uncertainty in reputation methods to enforce cooperation in ad-hoc networks. In Proceedings of the 5th ACM workshop on wireless security, September pp. 105–113.Google Scholar
  11. 11.
    Li, F., & Jie, W. (2010). Uncertainty modeling and reduction in MANETs. IEEE Transactions on Mobile Computing, 9(7), 1035–1048.CrossRefGoogle Scholar
  12. 12.
    Samad, F., & Makram, S. A. (2009). Protection based on neighborhood-trust in clustered wireless mesh networks. In Proceedings of third international conference on next generation mobile applications, services and technologies (NGMAST), Cardiff, Wales, UK, September pp. 487–493.Google Scholar
  13. 13.
    Ren, K., & Shucheng, Y. (2010). PEACE: A novel privacy-enhanced yet accountable security framework for metropolitan wireless mesh networks. IEEE Transactions On Parallel And Distributed Systems, 21(2), 203–215.CrossRefGoogle Scholar
  14. 14.
    Sen, J. (2011). An efficient and user privacy-preserving routing protocol for wireless mesh networks. International Journal Scalable Computing: Practice and Experience, 11(4), 345–358.Google Scholar
  15. 15.
    Li, C., Wang, Z., & Yang, C. (2011). Secure routing for wireless mesh networks. International Journal of Network Security, 13(2), 109–120.Google Scholar
  16. 16.
    Bahr, M. (2007). Update on the hybrid wireless mesh protocol of 802.11s. In Proceedings of IEEE international conference on mobile ad hoc and sensor systems, pp. 1–6.Google Scholar
  17. 17.
    Shafer, G. (1976). A mathematical theory of evidence. Princeton: NangJing.zbMATHGoogle Scholar
  18. 18.
    Kim, K., & Shin, K. G. (2006). On accurate measurement of link quality in multi-hop wireless mesh networks. In Proceedings of the 12th annual international conference on mobile computing and networking (MobiCom’06), Los Angeles, California, USA, September; pp. 38–49.Google Scholar
  19. 19.
    Ray, I., & Chakraborty, S. (2009). An interoperable context sensitive model of trust. Journal of Intelligent Information Systems, 32(1), 75–104.CrossRefGoogle Scholar
  20. 20.
    Lu, W.-P., & Sundareshan, M. K. (1990). A model for multilevel security in computer networks. IEEE Transactions on Software Engineering, 16(6), 647–659.CrossRefGoogle Scholar
  21. 21.
    Li, H., & Dhawan, A. P. (2010). Mosar: A secured on-demand routing protocol for mobile multilevel ad hoc. International Journal of Network Security, 10(2), 121–134.Google Scholar
  22. 22.
    Su, R., Zhang, Y., He, Z., & Fan, S. (2009). Trust-Based fuzzy access control model research. Proceedings of the Web Information Systems and Mining (WISM’09), 5854, 393–399.CrossRefGoogle Scholar
  23. 23.
    Ni, Q., Bertino, E., Brodie, C., Karat, C.-M., Karat, J., Lobo, J., et al. (2010). Privacy aware role based access control. ACM Transactions on Information and System Security, 13(3), 1–31.CrossRefGoogle Scholar
  24. 24.
    Zhang, G., & Tian, J. (2010). An extended role based access control model for the internet of things. Proceedings of the Information, Networking and Automation (ICINA), KunMing, China, 1, 319–323.Google Scholar
  25. 25.
    Sandhu, R. S., Coyne, E. J., Feinstein, H. L., & Youman, C. E. (1996). Role-based access control models. IEEE Computer, 29(2), 38–47.CrossRefGoogle Scholar
  26. 26.
    Feng, F., Lin, C., Peng, D., & Li, J. (2008). A trust and context based access control model for distributed systems. In Proceedings of the international symposium on advances of high performance computing and networking (AHPCN 2008), DaLian, China, 629–634.Google Scholar
  27. 27.
    Zhu, S., Sanjeev, S., & Sushil, J. (2003). LEAP: Efficient security mechanisms for large-scale distributed sensor networks. In Proceedings of the 10th ACM conference on computer and communications security, Washington D.C., USA.Google Scholar
  28. 28.
    Tian, B., Han, S., Parvin, S., & Dillon, T.S. (2010). A key management protocol for multiphase hierarchical wireless sensor networks. Proceedings of the embedded and ubiquitous computing, Hong Kong, China, pp. 617–623.Google Scholar
  29. 29.
    Ergun, M., Levi, A., & Savas, E. (2010). Increasing resiliency in multi-phase wireless sensor networks: Generationwise key predistribution approach. The Computer Journal Advance Access: Published by Oxford Univerisity Press on behalf of The British Computer Society, May. 11.Google Scholar
  30. 30.
    Jang, J., Kwon, T., & Song J. (2007). A time-based key management protocol for wireless sensor networks. Information Security Practice and Experience, pp. 314–328.Google Scholar
  31. 31.
    Ren, Y., & Boukerche, A. (2010). ARMA: A scalable secure routing protocol with privacy protection for mobile ad hoc networks. Wireless Communications and Mobile Computing, 10, 672–687.Google Scholar
  32. 32.
    Islam, M. S., Yoon, Y. J., Hamid, M. A., & Hong, C. S. (2008). A secure hybrid wireless mesh protocol for 802.11s mesh network. Proceedings of the ICCSA, 5072, 972–985.Google Scholar
  33. 33.
    Chen, M. (2004). OPNET Network Simulation. China: Beijing Tsinghua University Press.Google Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  • Hui Lin
    • 1
    • 2
    Email author
  • Jia Hu
    • 3
  • Jianfeng Ma
    • 1
  • Li Xu
    • 2
  • Atulya Nagar
    • 3
  1. 1.Shaanxi Key Laboratory of Network and System SecurityXidian UniversityXi’anChina
  2. 2.Key Lab of Network Security and CryptologyFujian Normal UniversityFuzhouChina
  3. 3.Department of Mathematics and Computer ScienceLiverpool Hope UniversityLiverpoolUK

Personalised recommendations