A Secure Hybrid Wireless Mesh Protocol for 802.11s Mesh Network

  • Md. Shariful Islam
  • Young Jig Yoon
  • Md. Abdul Hamid
  • Choong Seon Hong
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5072)


Wireless Mesh Network (WMN) has emerged as a key technology and found a great deal of interest for the researchers in the recent past. Hybrid Wireless Mesh Protocol (HWMP) is the default path selection (i.e., routing) protocol fully specified in the current draft D.1.06 of 802.11s for WMN. However, security in routing or forwarding functionality is not specified in the standard. As a consequence, HWMP in its current from is vulnerable to various types of routing attacks. In this paper, we propose a secure version of HWMP (SHWMP) that operates similarly to that of HWMP but uses cryptographic extensions to provide authenticity and integrity of routing messages and prevents unauthorized manipulation of mutable fields in the routing information elements. We have shown through analyses and simulation that SHWMP is robust against identified attacks and provides higher packet delivery ratio and incurs little computational and storage overhead to ensure security.


Wireless Mesh Network Secure Hybrid Wireless Mesh Protocol (SHWMP) Authentication Merkle Tree 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Akyildiz, I.F., Wang, X., Wang, W.: Wireless mesh networks: a survey. Computer Networks 47(4) (March 2005)Google Scholar
  2. 2.
    IEEE 802.11s Task Group, Draft Amendment to Standard for Information Technology Telecommunications and Information Exchange Between Systems – LAN/MAN Specific Requirements – Part 11: Wireless Medium Access Control (MAC) and physical layer (PHY) specifications: Amendment: ESS Mesh Networking, IEEE P802.11s/D1.06 (July 2007)Google Scholar
  3. 3.
    Wang, X., Lim, A.O.: IEEE 802.11s wireless mesh networks: Framework and Challenges. AdHoc Networks, 1–15 (2007) doi:10.1016/j.adhoc.2007.09.003Google Scholar
  4. 4.
    Merkle, R.C.: A certified digital signature (subtitle: That antique paper from 1979). In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)Google Scholar
  5. 5.
    Bahr, M.: Proposed Routing for IEEE 802.11s WLAN Mesh Networks. In: 2nd Annual International Wireless Internet Conference (WICON), Boston, MA, USA (August 2006)Google Scholar
  6. 6.
    Bahr, M.: Update on the Hybrid Wireless Mesh protocol of 802.11s. In: Proc. of IEEE International Conference on Mobile Adhoc and Sensor Systems, MASS 2007, pp. 1–6 (2007)Google Scholar
  7. 7.
    Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. In: Proc. MobiCom 2002, Atlanta, GA, September 23–28 (2002)Google Scholar
  8. 8.
    Perrig, A., Canetti, R., Tygar, J.D., Song, D.: Efficient authentication and signing of multicast streams over lossy channels. In: Proc. of IEEE Symposium on Security and Privacy, pp. 56–73 (2000)Google Scholar
  9. 9.
    Gergely, L.B., Vajda, I.: Provably secure on-demand routing in Mobile Adhoc Networks. IEEE transactions on Mobile Computingm 5(11), 1533–1546 (2006)CrossRefGoogle Scholar
  10. 10.
    Zapata, M.G., Asokan, N.: Securing Adhoc rouring protocols. In: Proc. of ACM Workshop of Wireless Security (Wise), September 2002, pp. 1–10 (2002)Google Scholar
  11. 11.
    Sangiri, K., Dahil, B.: A Secure Routing Protocol for Ad Hoc Networks. In: Proc. of 10th IEEE International Conference on Network Protocols (ICNP 2002) (2002)Google Scholar
  12. 12.
    The Network Simulator – ns-2,

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Md. Shariful Islam
    • 1
  • Young Jig Yoon
    • 1
  • Md. Abdul Hamid
    • 1
  • Choong Seon Hong
    • 1
  1. 1.Department of Computer EngineeringKyung Hee UniversityRepublic of Korea

Personalised recommendations