Abstract
Wireless mesh networks (WMNs) as compared to other conventional networks had emerged as the most popular choice in today’s era due to its distributed nature. WMNs allow multi-hop communication with the capability of self-healing. Due to its distributed nature, internal attacks such as blackhole, wormhole, and DOS attack could be easily launched to degrade the overall performance of WMNs. The attack disrupts the normal operation of routing protocols and causes a large amount of packet drop between mesh entities. Therefore, to ensure secure routing, it is essential to compute the trustworthiness of each node and to detect the malicious nodes within the WMNs. In this paper, we had proposed a trust-based detection algorithm that ensures the detection of malicious nodes in WMNs. The experimental result of our proposed protocol ensures an efficient detection of the malicious node with a higher detection rate.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Akyildiz IF, Wang X (2005) A survey on wireless mesh networks. IEEE Commun Mag 9:S23–S30
Piechowiak M, Zwierzykowski P, Owczarek P, Wasowicz M (2016) Comparative analysis of routing protocols for wireless mesh networks. In: 10th international symposium on communication systems, networks and digital signal processing (CSNDSP). IEEE, Prague, Czech Republic, pp 1–5. https://doi.org/10.1109/CSNDSP.2016.7573902
Moudni H, Er-rouidi M, Mouncif H, El Hadadi B (2016) Secure routing protocols for mobile ad hoc networks. In: International conference on information technology for organizations development (IT4OD). IEEE, Fez, Moroccopp, pp 1–7. https://doi.org/10.1109/IT4OD.2016.7479295
Zhang W, Wang Z, Das SK, Hassan M (2008) Security issues in wireless mesh networks. Springer, Boston, MA, pp 309–330
Santhanam L, Xie B, Agrawal DP (2008) Selfishness in mesh networks: wired multihop MANETs. IEEE Wireless Commun 15:16–23
Altman Y, Keren AY, U.S. Patent No. 9,479,523, U.S. Patent and Trademark Office, Washington, DC
Sen J (2010) An efficient algorithm for detection of selfish packet dropping nodes in Wireless Mesh Networks. In: International conference on computer information systems and industrial management applications (CISIM). IEEE, Krackow, Poland, pp 283–288. https://doi.org/10.1109/CISIM.2010.5643647
Wang B, Soltani S, Shaprio JK, Tan PN, Mutka M (2008) Distributed detection of selfish routing in wireless mesh networks. Technical Report MSU-CSE-06-19, Department of Computer Science and Engineering, Michigan State University
Papadimitratos P, Haas ZJ (2002) Secure routing for mobile ad hoc networks. In: Communication networks and distributed systems modeling and simulation conference (No. CONF). SCS, San Antonio, TX, pp 1–13
Buttyan L, Thong TV (2010) Formal verification of secure ad-hoc network routing protocols using deductive model-checking. In: Proceedings of the wireless and mobile networking conference (WMNC). IEEE, Budapest, Hungary, pp 1–6. https://doi.org/10.1109/WMNC.2010.5678752
Pervaiz MO, Cardei M, Wu J (2005) Routing security in ad hoc wireless networks. Springer, Boston, MA, pp 117–142. https://doi.org/10.1007/978-0-387-73821-5-6
Regan R, Manickam JML (2017) Detecting and denying malicious behavior using adaptive learning based routing protocols in wireless mesh network. Appl Math Inf Sci 11:1155–1162
Subhash P, Ramachandram S (2015) Secure neighbour discovery in wireless mesh networks using connectivity information. In: International conference on advances in computing, communications and informatics (ICACCI). IEEE, Kochi, India, pp 2061–2066. https://doi.org/10.1109/ICACCI.2015.7275920
Gao T, Peng F, Guo N (2016) Anonymous authentication scheme based on identity-based proxy group signature for wireless mesh network. EURASIP J Wirel Commun Netw. https://doi.org/10.1186/s13638-016-0685-2
Niizuma T, Goto H (2017) Easy-to-deploy wireless mesh network system with user authentication and WLAN roaming features. IEICE Trans Inf Syst 100:511–519
Gaur MS, Pant B (2015) Trusted and secure clustering in mobile pervasive environment. Human-centric computing and information sciences. Springer, Berlin, Heidelberg. https://doi.org/10.1186/s13673-015-0050-1
Singh R, Singh J, Singh R (2016) WRHT: a hybrid technique for detection of wormhole attack in wireless sensor networks. Mob Inf Syst. https://doi.org/10.1155/2016/8354930
Guo J, Zhou X, Yuan J, Xu H (2013) Secure access control guarding against internal attacks in distributed networks. Wirel Pers Commun 68:1595–1609
Zhang Z, Long K, Wang J (2013) Self-organization paradigms and optimization approaches for cognitive radio technologies: a survey. IEEE Wirel Commun 20:36–42
Abdel-Azim M, Salah HED, Eissa ME (2018) IDS against black-hole attack for MANET. IJ Netw Sec 20:585–592
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Roy, A.K., Khan, A.K. (2021). Prevention Against Internal Attack via Trust-Based Detection for Wireless Mesh Networks. In: Hura, G.S., Singh, A.K., Siong Hoe, L. (eds) Advances in Communication and Computational Technology. ICACCT 2019. Lecture Notes in Electrical Engineering, vol 668. Springer, Singapore. https://doi.org/10.1007/978-981-15-5341-7_8
Download citation
DOI: https://doi.org/10.1007/978-981-15-5341-7_8
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-5340-0
Online ISBN: 978-981-15-5341-7
eBook Packages: EngineeringEngineering (R0)