Advertisement

Securing Layer-2 Path Selection in Wireless Mesh Networks

  • Md. Shariful Islam
  • Md. Abdul Hamid
  • Byung Goo Choi
  • Choong Seon Hong
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5379)

Abstract

The current draft standard of 802.11s has defined routing for Wireless Mesh Networks (WMNs) in layer-2 and to differentiate from layer-3 routing, it termed layer-2 routing as path selection. The layer-2 path selection (LPS) mechanism is fully specified in the draft of IEEE 802.11s for WMNs. However, routing with security provision is not specified in the standard. Our study identifies that the current path selection mechanism is vulnerable to various types of routing attacks like flooding, route re-direction, spoofing etc. In this paper, we develop a novel Secure Layer-2 Path Selection (SLPS) mechanism that uses cryptographic extensions to provide authenticity and integrity of routing messages. Particularly, the proposed SLPS prevents unauthorized manipulation of mutable fields in the routing messages. Results from analysis and simulation demonstrate that SLPS protocol is robust against identified attacks and provides higher packet delivery ratio, requires no extra communication cost and incurs little path acquisition delay, computational and storage overhead to accomplish secure path selection.

Keywords

Security Merkle Tree-based Authentication Layer-2 Routing Wireless Mesh Networks 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Akyildiz, I.F., Wang, X., Wang, W.: Wireless mesh networks: a survey. Computer Networks 47(4), 445–487 (2005)CrossRefzbMATHGoogle Scholar
  2. 2.
    IEEE 802.11s Task Group, Draft Amendment to Standard for Information technology-Telecommunications and Information Exchange Between Systems–Local and metropolitan area networks-Specific requirements - Part 11: Wireless Lan Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Amendment IEEE p802.11s/d1.06: Mesh Networking (July 2007)Google Scholar
  3. 3.
    Wang, X., Lim, A.O.: IEEE 802.11s wireless mesh networks: Framework and challenges. Ad Hoc Networks 6, 970–984 (2008)CrossRefGoogle Scholar
  4. 4.
    Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)Google Scholar
  5. 5.
    Bahr, M.: Proposed routing for ieee 802.11s wlan mesh networks. In: WICON 2006: Proceedings of the 2nd annual international workshop on Wireless internet, p. 5. ACM, New York (2006)Google Scholar
  6. 6.
    Bahr, M.: Update on the hybrid wireless mesh protocol of IEEE 802.11s. In: IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems, MASS 2007, pp. 1–6 (2007)Google Scholar
  7. 7.
    Lim, A.O., Wang, X., Kado, Y., Zhang, B.: A hybrid centralized routing protocol for 802.11s wmns. Mob. Netw. Appl. 13(1), 117–131 (2008)CrossRefGoogle Scholar
  8. 8.
    Hu, Y.C., Perrig, A., Johnson, D.B.: Ariadne: a secure on-demand routing protocol for ad hoc networks. Wirel. Netw. 11(1-2), 21–38 (2005)CrossRefGoogle Scholar
  9. 9.
    Perrig, A., Tygar, J.D., Song, D., Canetti, R.: Efficient authentication and signing of multicast streams over lossy channels. In: SP 2000: Proceedings of the 2000 IEEE Symposium on Security and Privacy, p. 56. IEEE Computer Society, Washington (2000)CrossRefGoogle Scholar
  10. 10.
    Ács, G., Buttyán, L., Vajda, I.: Provably secure on-demand source routing in mobile ad hoc networks. IEEE Trans. Mob. Comput. 5(11), 1533–1546 (2006)CrossRefGoogle Scholar
  11. 11.
    Zapata, M.G., Asokan, N.: Securing ad hoc routing protocols. In: WiSE 2002: Proceedings of the 1st ACM workshop on Wireless security, pp. 1–10. ACM, New York (2002)Google Scholar
  12. 12.
    Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: A secure routing protocol for ad hoc networks. In: ICNP 2002: Proceedings of the 10th IEEE International Conference on Network Protocols, pp. 78–89. IEEE Computer Society, Washington (2002)CrossRefGoogle Scholar
  13. 13.
    Information Sciences Institute: NS-2 network simulator. Software Package (2003), http://www.isi.edu/nsnam/ns/

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Md. Shariful Islam
    • 1
  • Md. Abdul Hamid
    • 1
  • Byung Goo Choi
    • 1
  • Choong Seon Hong
    • 1
  1. 1.Department of Computer EngineeringKyung Hee UniversityRepublic of Korea

Personalised recommendations