Securing Layer-2 Path Selection in Wireless Mesh Networks
The current draft standard of 802.11s has defined routing for Wireless Mesh Networks (WMNs) in layer-2 and to differentiate from layer-3 routing, it termed layer-2 routing as path selection. The layer-2 path selection (LPS) mechanism is fully specified in the draft of IEEE 802.11s for WMNs. However, routing with security provision is not specified in the standard. Our study identifies that the current path selection mechanism is vulnerable to various types of routing attacks like flooding, route re-direction, spoofing etc. In this paper, we develop a novel Secure Layer-2 Path Selection (SLPS) mechanism that uses cryptographic extensions to provide authenticity and integrity of routing messages. Particularly, the proposed SLPS prevents unauthorized manipulation of mutable fields in the routing messages. Results from analysis and simulation demonstrate that SLPS protocol is robust against identified attacks and provides higher packet delivery ratio, requires no extra communication cost and incurs little path acquisition delay, computational and storage overhead to accomplish secure path selection.
KeywordsSecurity Merkle Tree-based Authentication Layer-2 Routing Wireless Mesh Networks
Unable to display preview. Download preview PDF.
- 2.IEEE 802.11s Task Group, Draft Amendment to Standard for Information technology-Telecommunications and Information Exchange Between Systems–Local and metropolitan area networks-Specific requirements - Part 11: Wireless Lan Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Amendment IEEE p802.11s/d1.06: Mesh Networking (July 2007)Google Scholar
- 4.Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)Google Scholar
- 5.Bahr, M.: Proposed routing for ieee 802.11s wlan mesh networks. In: WICON 2006: Proceedings of the 2nd annual international workshop on Wireless internet, p. 5. ACM, New York (2006)Google Scholar
- 6.Bahr, M.: Update on the hybrid wireless mesh protocol of IEEE 802.11s. In: IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems, MASS 2007, pp. 1–6 (2007)Google Scholar
- 11.Zapata, M.G., Asokan, N.: Securing ad hoc routing protocols. In: WiSE 2002: Proceedings of the 1st ACM workshop on Wireless security, pp. 1–10. ACM, New York (2002)Google Scholar
- 13.Information Sciences Institute: NS-2 network simulator. Software Package (2003), http://www.isi.edu/nsnam/ns/