Skip to main content

Prevention Against Internal Attack via Trust-Based Detection for Wireless Mesh Networks

  • Conference paper
  • First Online:
Advances in Communication and Computational Technology (ICACCT 2019)

Abstract

Wireless mesh networks (WMNs) as compared to other conventional networks had emerged as the most popular choice in today’s era due to its distributed nature. WMNs allow multi-hop communication with the capability of self-healing. Due to its distributed nature, internal attacks such as blackhole, wormhole, and DOS attack could be easily launched to degrade the overall performance of WMNs. The attack disrupts the normal operation of routing protocols and causes a large amount of packet drop between mesh entities. Therefore, to ensure secure routing, it is essential to compute the trustworthiness of each node and to detect the malicious nodes within the WMNs. In this paper, we had proposed a trust-based detection algorithm that ensures the detection of malicious nodes in WMNs. The experimental result of our proposed protocol ensures an efficient detection of the malicious node with a higher detection rate.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Akyildiz IF, Wang X (2005) A survey on wireless mesh networks. IEEE Commun Mag 9:S23–S30

    Article  Google Scholar 

  2. Piechowiak M, Zwierzykowski P, Owczarek P, Wasowicz M (2016) Comparative analysis of routing protocols for wireless mesh networks. In: 10th international symposium on communication systems, networks and digital signal processing (CSNDSP). IEEE, Prague, Czech Republic, pp 1–5. https://doi.org/10.1109/CSNDSP.2016.7573902

  3. Moudni H, Er-rouidi M, Mouncif H, El Hadadi B (2016) Secure routing protocols for mobile ad hoc networks. In: International conference on information technology for organizations development (IT4OD). IEEE, Fez, Moroccopp, pp 1–7. https://doi.org/10.1109/IT4OD.2016.7479295

  4. Zhang W, Wang Z, Das SK, Hassan M (2008) Security issues in wireless mesh networks. Springer, Boston, MA, pp 309–330

    Google Scholar 

  5. Santhanam L, Xie B, Agrawal DP (2008) Selfishness in mesh networks: wired multihop MANETs. IEEE Wireless Commun 15:16–23

    Article  Google Scholar 

  6. Altman Y, Keren AY, U.S. Patent No. 9,479,523, U.S. Patent and Trademark Office, Washington, DC

    Google Scholar 

  7. Sen J (2010) An efficient algorithm for detection of selfish packet dropping nodes in Wireless Mesh Networks. In: International conference on computer information systems and industrial management applications (CISIM). IEEE, Krackow, Poland, pp 283–288. https://doi.org/10.1109/CISIM.2010.5643647

  8. Wang B, Soltani S, Shaprio JK, Tan PN, Mutka M (2008) Distributed detection of selfish routing in wireless mesh networks. Technical Report MSU-CSE-06-19, Department of Computer Science and Engineering, Michigan State University

    Google Scholar 

  9. Papadimitratos P, Haas ZJ (2002) Secure routing for mobile ad hoc networks. In: Communication networks and distributed systems modeling and simulation conference (No. CONF). SCS, San Antonio, TX, pp 1–13

    Google Scholar 

  10. Buttyan L, Thong TV (2010) Formal verification of secure ad-hoc network routing protocols using deductive model-checking. In: Proceedings of the wireless and mobile networking conference (WMNC). IEEE, Budapest, Hungary, pp 1–6. https://doi.org/10.1109/WMNC.2010.5678752

  11. Pervaiz MO, Cardei M, Wu J (2005) Routing security in ad hoc wireless networks. Springer, Boston, MA, pp 117–142. https://doi.org/10.1007/978-0-387-73821-5-6

  12. Regan R, Manickam JML (2017) Detecting and denying malicious behavior using adaptive learning based routing protocols in wireless mesh network. Appl Math Inf Sci 11:1155–1162

    Article  Google Scholar 

  13. Subhash P, Ramachandram S (2015) Secure neighbour discovery in wireless mesh networks using connectivity information. In: International conference on advances in computing, communications and informatics (ICACCI). IEEE, Kochi, India, pp 2061–2066. https://doi.org/10.1109/ICACCI.2015.7275920

  14. Gao T, Peng F, Guo N (2016) Anonymous authentication scheme based on identity-based proxy group signature for wireless mesh network. EURASIP J Wirel Commun Netw. https://doi.org/10.1186/s13638-016-0685-2

  15. Niizuma T, Goto H (2017) Easy-to-deploy wireless mesh network system with user authentication and WLAN roaming features. IEICE Trans Inf Syst 100:511–519

    Article  Google Scholar 

  16. Gaur MS, Pant B (2015) Trusted and secure clustering in mobile pervasive environment. Human-centric computing and information sciences. Springer, Berlin, Heidelberg. https://doi.org/10.1186/s13673-015-0050-1

  17. Singh R, Singh J, Singh R (2016) WRHT: a hybrid technique for detection of wormhole attack in wireless sensor networks. Mob Inf Syst. https://doi.org/10.1155/2016/8354930

    Article  Google Scholar 

  18. Guo J, Zhou X, Yuan J, Xu H (2013) Secure access control guarding against internal attacks in distributed networks. Wirel Pers Commun 68:1595–1609

    Article  Google Scholar 

  19. Zhang Z, Long K, Wang J (2013) Self-organization paradigms and optimization approaches for cognitive radio technologies: a survey. IEEE Wirel Commun 20:36–42

    Article  Google Scholar 

  20. Abdel-Azim M, Salah HED, Eissa ME (2018) IDS against black-hole attack for MANET. IJ Netw Sec 20:585–592

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amit Kumar Roy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Roy, A.K., Khan, A.K. (2021). Prevention Against Internal Attack via Trust-Based Detection for Wireless Mesh Networks. In: Hura, G.S., Singh, A.K., Siong Hoe, L. (eds) Advances in Communication and Computational Technology. ICACCT 2019. Lecture Notes in Electrical Engineering, vol 668. Springer, Singapore. https://doi.org/10.1007/978-981-15-5341-7_8

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-5341-7_8

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-5340-0

  • Online ISBN: 978-981-15-5341-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics