Advertisement

Privacy Based Optimal Routing in Wireless Mesh Networks

  • T. M. Navamani
  • P. Yogesh
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 248)

Abstract

User privacy and security have been primary concerns in Wireless Mesh Networks (WMNs) due to their peer-to-peer network topology, shared wireless medium and highly dynamic environment. Nowadays, anonymity has received increasing attention due to the users’ awareness of their privacy. Anonymity provides protection for users to enjoy network services without being traced. The multi-hop architecture of WMN lays a foundation for most of the routing attacks like packet dropping and packet misdirecting attacks. In this paper, we propose Privacy Based Optimal Routing (PBOR) which provides security and user anonymity while maintaining communication efficiency in WMN. To address privacy and anonymity, security card based routing scheme is implemented. In order to provide security against packet dropping and misdirecting attacks, strong protection is needed and it can be achieved by enhancing the routing metrics during route discovery. Although there are several schemes are proposed to defend against these attacks, there occurs more routing overhead and delay. To overcome these issues, we propose privacy based optimal routing protocol to provide an optimal path for data transmission. Our implementation results show that the proposed scheme increases the overall performance of the network substantially.

Keywords

Wireless Mesh Networks (WMN) Security Privacy Anonymity Routing 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Ramya, R., Navamani, T.M., Yogesh, P.: Secured Identity Based Routing and privacy Preservation in Wireless Mesh Networks. In: ICRTIT, vol. 26, pp. 521–526 (2011)Google Scholar
  2. 2.
    Wan, Z., Zhu, K.R.B., Preneel, B., Gu, M.: Anonymous User Communication for Privacy Protection in Wireless Metropolitan Mesh Networks. IEEE Transactions on Vehicular Technology 59, 519–532 (2010)CrossRefGoogle Scholar
  3. 3.
    Lin, H., Ma, J., Hu, J., Yang, K.: PA-SHWMP: a privacy-aware secure hybrid wireless mesh protocol for IEEE 802.11s wireless mesh networks. EURASIP Journal on Wireless Communication and Networking 6 (2012)Google Scholar
  4. 4.
    Wan, Z., Ren, K., Gu, M.: USOR: An Unobservable Secure On-Demand Routing Protocol for Mobile Ad Hoc Networks. IEEE Transactions on Wireless Communications 11, 1922–1932 (2012)CrossRefGoogle Scholar
  5. 5.
    Li, X., Qian, L., Kamto, J.: Secure Anonymous Routing in Wireless Mesh Networks. In: IEEE International Conference on E-Business and Information System Security, vol. 64, pp. 1–5 (2009)Google Scholar
  6. 6.
    Ben Salem, N., Hubaux, J.P.: Securing Wireless Mesh Networks. IEEE Wireless Communications 13(2), 50–55 (2006)CrossRefGoogle Scholar
  7. 7.
    Siddiqui, M., Hong, C.: Security Issues in Wireless Mesh Networks. In: IEEE International Conference on Multimedia and Ubiquitous Engineering, pp. 717–722 (April 2007)Google Scholar
  8. 8.
    Capkun, S., Hubaux, J., Jakobsson, M.: Secure and Privacy preserving communication in hybrid ad hoc networks. In: Swiss Fed. Inst. Technol.,-DI-ICA, Lausanne, Switzerland (2004)Google Scholar
  9. 9.
    Khan, S., Loo, K.-K., Mast, N., Naeem, T.: SRPM: Secure Routing Protocol for IEEE 802.11 Infrastructure Based Wireless Mesh Networks. Springer Journal 18, 190–209 (2010)Google Scholar
  10. 10.
    Khan, S., Alrajeh, N.A., Loo, K.-K.: Secure route selection in wireless mesh networks. Elsevier 56(2), 491–503 (2011)CrossRefGoogle Scholar
  11. 11.
    Bansal, D.: Sofat: Secure Routing Protocol for Hybrid Wireless Mesh Network (HWMN). In: International Conference on Computer and Communication Technology (ICCCT), vol. 25, pp. 837–843 (2010)Google Scholar
  12. 12.
    Zhang, Y., Fang, Y.: ARSA: An Attack Resilient Security Architecture for Multihop Wireless Mesh Networks. IEEE Journal on Selected Areas in Communications 24(10) (October 2006)Google Scholar
  13. 13.
    Zhang, Y., Liu, W., Luo, W.: Anonymous Communication in Mobile Ad Hoc Networks. In: Proceedings of INFOCOM, vol. 3, pp. 1940–1951 (2005)Google Scholar
  14. 14.
    Ren, K., Lou, W., Kim, K., Deng, R.: A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environment. IEEE Transactions on Vehicular Technology 55(4), 1373–1384 (2006)CrossRefGoogle Scholar
  15. 15.
    Ren, K., Lou, W.: Privacy-Enhanced, Attack-Resilient Access Control in Pervasive Computing Environments with Optional Context Authentication Capability. ACM Mobile Networks and Applications (MONET) (Special Issue on Wireless Broadband Access) 12, 79–92 (2007)CrossRefGoogle Scholar
  16. 16.
    Zhang, Y., Ren, K.: On Address Privacy in Mobile Ad Hoc Networks. ACM/Springer Mobile Networks and Applications (MONET) 14(2), 188–197 (2009)MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringEaswari Engineering CollegeChennaiIndia
  2. 2.Department of Information Science and TechnologyAnna UniversityChennaiIndia

Personalised recommendations