Skip to main content
Log in

A trust mechanism-based channel assignment and routing scheme in cognitive wireless mesh networks with intrusion detection

  • Published:
Journal of Electronics (China)

Abstract

Cognitive Wireless Mesh Networks (CWMN) is a novel wireless network which combines the advantage of Cognitive Radio (CR) and wireless mesh networks. CWMN can realize seamless integration of heterogeneous wireless networks and achieve better radio resource utilization. However, it is particularly vulnerable due to its features of open medium, dynamic spectrum, dynamic topology, and multi-top routing, etc.. Being a dynamic positive security strategy, intrusion detection can provide powerful safeguard to CWMN. In this paper, we introduce trust mechanism into CWMN with intrusion detection and present a trust establishment model based on intrusion detection. Node trust degree and the trust degree of data transmission channels between nodes are defined and an algorithm of calculating trust degree is given based on distributed detection of attack to networks. A channel assignment and routing scheme is proposed, in which selects the trusted nodes and allocates data channel with high trust degree for the transmission between neighbor nodes to establish a trusted route. Simulation results indicate that the scheme can vary channel allocation and routing dynamically according to network security state so as to avoid suspect nodes and unsafe channels, and improve the packet safe delivery fraction effectively.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Tao Chen, Honggang Zhang, Gian Mario Maggio, et al.. CogMesh: A cluster-based cognitive radio network. 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, DySPAN’ 07, Dublin, Ireland, April 17–20, 2007, 168–178.

  2. Kaushik R. Chowdhury and Ian F. Akyildiz. Cognitive wireless mesh network with dynamic spectrum access. IEEE Journal on Selected Areas in Communications, 26(2008)1, 168–180.

    Article  Google Scholar 

  3. Yi Ping, Xing Hongkai, Wu Yue, and Li Jianhua. Security in wireless mesh networks: challenges and solutions. China Communications, 6(2009)3, 134–143.

    Google Scholar 

  4. A. Jsang, R. Ismail, and C. Boyd. A survey of trust and reputation systems for online service provision. Decision Support Systems, 43(2005)2, 618–644.

    Article  Google Scholar 

  5. M. Langheinrich. When trust does not compute-the role of trust in ubiquitous computing. The Fifth International Conference on Ubiquitous Computing, UBICOMP’ 03, Seattle, Washington, USA, October 12–15, 2003.

  6. Yan Lindsay Sun and Yafei Yang. Trust Establishment in Distributed Networks: Analysis and Modeling. IEEE International Conference on Communications, ICC’07, Glasgow, Scotland, June 24–28, 2007, 1266–1273.

  7. Yu Han. Research of A Reputation-based Secure Routing Protocol in Wireless Mesh Networks. Software Guide, 8(2009)8, 149–151 (in Chinese). 余涵. 无线Mesh网中基于声誉的安全路由协议研究. 软件导刊, 8(2009)8, 149–151.

    Google Scholar 

  8. Zhang Jing, Hu Hanying, Tong Min, and Li Qingrong. A security metric and related security routing algorithm design based on trust model. Journal of Electronics and Information Technology, 30(2008)1, 10–15 (in Chinese). 张静, 胡捍英, 童珉, 李庆荣. 一种基于信任模型的安 全度量及安全路由算法设计. 电子与信息学报, 30(2008)1, 10–15.

    Google Scholar 

  9. Huang Dijiang, Medhi Deep, and Beard Cory. Trust analysis of link state network routing. Proceedings of the 2nd International Workshop on Trusted Internet (TIW), Hyderabad, India, 2003, 201–211.

  10. I. F. Akyildiz, W. Y. Lee, M. C. Vuran, et al.. NeXt generation/dynamic spectrum access/cognitive radio wireless networks: a survey. Journal of Computer Networks, 50(2007)13, 2127–2159.

    Article  Google Scholar 

  11. Zhang Jingdong and Wu Zhenqiang. Mesh secure multi-path routing protocol of neighbor authentication. Computer Engineering and Applications, 45 (2009)4, 115–118 (in Chinese). 张景东, 吴振强. 邻居认证的Mesh网络安全多路径路 由协议. 计算机工程与应用, 45(2009)4, 115–118.

    Google Scholar 

  12. R. Guha, R. Kumar, P. Raghavan, and A. Tomkins. Propagation. Propagation of trust and distrust. Proceedings of International Conference on the World Wide Web 2004, www’ 04, New York, NY, USA, May 17–22, 2004, 403–412.

  13. A. C. Ramon and P. C. Jesus. Adding multiple interface support in NS-2. http://personales.unican.es/aguerocr/, 2007.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guofeng Wu.

Additional information

Supported by the National High Technology Research and Development Program (No. 2009AA011504).

Communication author: Wu Guofeng, born in 1974, male, Ph.D..

About this article

Cite this article

Wu, G., Zhang, J. & He, Z. A trust mechanism-based channel assignment and routing scheme in cognitive wireless mesh networks with intrusion detection. J. Electron.(China) 27, 728–734 (2010). https://doi.org/10.1007/s11767-011-0484-1

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11767-011-0484-1

Key words

CLC index

Navigation