Skip to main content

SHWMP: A Secure Hybrid Wireless Mesh Protocol for IEEE 802.11s Wireless Mesh Networks

  • Chapter
Transactions on Computational Science VI

Part of the book series: Lecture Notes in Computer Science ((TCOMPUTATSCIE,volume 5730))

Abstract

In recent years, mesh networking has emerged as a key technology for the last mile Internet access and found to be an important area of research and deployment. The current draft standard of IEEE 802.11s has defined routing for Wireless Mesh Networks (WMNs) in layer-2 and is termed as Hybrid Wireless Mesh Protocol (HWMP). However, security in routing or forwarding functionality is not specified in the standard. As a consequence, HWMP in its current from is vulnerable to various types of routing attacks such as flooding, route disruption and diversion, spoofing etc. In this paper, we propose SHWMP, a secure HWMP protocol for WMN. The proposed protocol uses cryptographic extensions to provide authenticity and integrity of HWMP routing messages and prevents unauthorized manipulation of mutable fields in the routing information elements. We show via analysis that the proposed SHWMP successfully thwarts all the identified attacks. Through extensive ns-2 simulations, we show that SHWMP provides higher packet delivery ratio with little increase in end-to-end delay, path acquisition delay and control byte overhead.

“This research was supported by the MKE, Korea, under the ITRC support program supervised by the NIPA” (NIPA-2009-(C1090-0902-0016)).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akyildiz, I.F., Wang, X., Wang, W.: Wireless Mesh Networks: a Survey. Computer Networks 47(4) (2005)

    Google Scholar 

  2. IEEE 802.11s Task Group, Draft Amendment to Standard for Information Technology Telecommunications and Information Exchange Between Systems – LAN/MAN Specific Requirements – Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) specifications: Amendment: ESS Mesh Networking, IEEE P802.11s/D2.02 (September 2008)

    Google Scholar 

  3. Wang, X., Lim, A.O.: IEEE 802.11s Wireless Mesh Networks: Framework and Challenges. In: AdHoc Networks, pp. 1–15 (2007), doi:10.1016/j.adhoc.2007.09.003

    Google Scholar 

  4. Islam, M.S., Yoon, Y.J., Hamid, M.A., Hong, C.S.: A Secure Hybrid Wireless Mesh Protocol for 802.11s Mesh Network. In: Gervasi, O., Murgante, B., Laganà, A., Taniar, D., Mun, Y., Gavrilova, M.L. (eds.) ICCSA 2008, Part I. LNCS, vol. 5072, pp. 972–985. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  5. Merkle, R.C.: A Certified Digital Signature (subtitle: That Antique Paper from 1979). In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)

    Google Scholar 

  6. Bahr, M.: Proposed Routing for IEEE 802.11s WLAN Mesh Networks. In: 2nd Annual International Wireless Internet Conference (WICON), Boston, MA, USA (2006)

    Google Scholar 

  7. IEEE P802.11sTM/D0.01, Draft amendment to standard IEEE 802.11TM: ESS Mesh Networking. IEEE (March 2006)

    Google Scholar 

  8. Bahr, M.: Update on the Hybrid Wireless Mesh protocol of 802.11s. In: Proc. of IEEE International Conference on Mobile Adhoc and Sensor Systems, 2007. MASS, pp. 1–6 (2007)

    Google Scholar 

  9. Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. In: Proc. MobiCom 2002, Atlanta, GA (2002)

    Google Scholar 

  10. Perrig, A., Canetti, R., Tygar, J.D., Song, D.: Efficient Authentication and Signing of Multicast Streams over Lossy Channels. In: Proc. of IEEE Symposium on Security and Privacy, 2000, pp. 56–73 (2002)

    Google Scholar 

  11. Gergely, A., Buttyan, L., Vajda, I.: Provably Secure On-demand Routing in Mobile Ad Hoc Networks. IEEE transactions on Mobile Computing 5(11), 1533–1546 (2006)

    Article  Google Scholar 

  12. Zapata, M.G., Asokan, N.: Securing Adhoc Routing Protocols. In: Proc. of ACM Workshop of Wireless Security(Wise), pp. 1–10 (2002)

    Google Scholar 

  13. Sangiri, K., Dahil, B.: A Secure Routing Protocol for Ad Hoc Networks. In: Proc. of 10th IEEE International Conference on Network Protocols, ICNP 2002 (2002)

    Google Scholar 

  14. Szydlo, M.: Merkle Tree Traversal in Log Space and Time. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 541–554. Springer, Heidelberg (2004)

    Google Scholar 

  15. Jakobsson, M., Leighton, T., Micali, S., Szydlo, M.: Fractal Merkle Tree Representation and Traversal. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 314–326. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  16. FIPS PUB 180-1, Secure Hash Standard, SHA-1, http://www.itl.nist.gov/fipspubs/fip180-1.htm

  17. Lim, A.O., Wang, X., Kado, Y., Zhang, B.: A Hybrid Centralized Routing Protocol for 802.11s WMNs. Journal of Mobile Networks and Applications (2008)

    Google Scholar 

  18. The Network Simulator – ns-2, http://www.isi.edu/nsnam/ns/index.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Islam, M.S., Hamid, M.A., Hong, C.S. (2009). SHWMP: A Secure Hybrid Wireless Mesh Protocol for IEEE 802.11s Wireless Mesh Networks. In: Gavrilova, M.L., Tan, C.J.K. (eds) Transactions on Computational Science VI. Lecture Notes in Computer Science, vol 5730. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10649-1_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-10649-1_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-10648-4

  • Online ISBN: 978-3-642-10649-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics