Privacy Based Optimal Routing in Wireless Mesh Networks
User privacy and security have been primary concerns in Wireless Mesh Networks (WMNs) due to their peer-to-peer network topology, shared wireless medium and highly dynamic environment. Nowadays, anonymity has received increasing attention due to the users’ awareness of their privacy. Anonymity provides protection for users to enjoy network services without being traced. The multi-hop architecture of WMN lays a foundation for most of the routing attacks like packet dropping and packet misdirecting attacks. In this paper, we propose Privacy Based Optimal Routing (PBOR) which provides security and user anonymity while maintaining communication efficiency in WMN. To address privacy and anonymity, security card based routing scheme is implemented. In order to provide security against packet dropping and misdirecting attacks, strong protection is needed and it can be achieved by enhancing the routing metrics during route discovery. Although there are several schemes are proposed to defend against these attacks, there occurs more routing overhead and delay. To overcome these issues, we propose privacy based optimal routing protocol to provide an optimal path for data transmission. Our implementation results show that the proposed scheme increases the overall performance of the network substantially.
KeywordsWireless Mesh Networks (WMN) Security Privacy Anonymity Routing
Unable to display preview. Download preview PDF.
- 1.Ramya, R., Navamani, T.M., Yogesh, P.: Secured Identity Based Routing and privacy Preservation in Wireless Mesh Networks. In: ICRTIT, vol. 26, pp. 521–526 (2011)Google Scholar
- 3.Lin, H., Ma, J., Hu, J., Yang, K.: PA-SHWMP: a privacy-aware secure hybrid wireless mesh protocol for IEEE 802.11s wireless mesh networks. EURASIP Journal on Wireless Communication and Networking 6 (2012)Google Scholar
- 5.Li, X., Qian, L., Kamto, J.: Secure Anonymous Routing in Wireless Mesh Networks. In: IEEE International Conference on E-Business and Information System Security, vol. 64, pp. 1–5 (2009)Google Scholar
- 7.Siddiqui, M., Hong, C.: Security Issues in Wireless Mesh Networks. In: IEEE International Conference on Multimedia and Ubiquitous Engineering, pp. 717–722 (April 2007)Google Scholar
- 8.Capkun, S., Hubaux, J., Jakobsson, M.: Secure and Privacy preserving communication in hybrid ad hoc networks. In: Swiss Fed. Inst. Technol.,-DI-ICA, Lausanne, Switzerland (2004)Google Scholar
- 9.Khan, S., Loo, K.-K., Mast, N., Naeem, T.: SRPM: Secure Routing Protocol for IEEE 802.11 Infrastructure Based Wireless Mesh Networks. Springer Journal 18, 190–209 (2010)Google Scholar
- 11.Bansal, D.: Sofat: Secure Routing Protocol for Hybrid Wireless Mesh Network (HWMN). In: International Conference on Computer and Communication Technology (ICCCT), vol. 25, pp. 837–843 (2010)Google Scholar
- 12.Zhang, Y., Fang, Y.: ARSA: An Attack Resilient Security Architecture for Multihop Wireless Mesh Networks. IEEE Journal on Selected Areas in Communications 24(10) (October 2006)Google Scholar
- 13.Zhang, Y., Liu, W., Luo, W.: Anonymous Communication in Mobile Ad Hoc Networks. In: Proceedings of INFOCOM, vol. 3, pp. 1940–1951 (2005)Google Scholar