Skip to main content

A PKI Based Mesh Router Authentication Scheme to Protect from Malicious Node in Wireless Mesh Network

  • Conference paper
  • 958 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 5787))

Abstract

Wireless mesh network can increase service coverage by low-cost multiple-paths between a source and a destination. But because of the wireless nature, wireless mesh network is vulnerable to diversified threats. Especially attacks by malicious nodes can decrease the performance or ravage the network. Many protocols, based on Public Key Infrastructure (PKI), have been proposed to ensure security however; these protocols cannot efficiently prevent the cases of compromised nodes. In this paper, we propose a mesh router authentication scheme to solve this problem of existing protocols. Although our scheme increases the end-to-end delay, the proposed mesh router authentication scheme can guarantee secure wireless mesh network communication from malicious nodes.

This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education, Science and Technology (R01-2008-000-20801-0).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akyildiz, I.F.: A Survey on Wireless mesh network, IEEE Radio Communications (September 2005)

    Google Scholar 

  2. Ben Salem, N., Hubaux, J.-P.: Securing Wireless mesh network. Wireless Communications, IEEE 13(2), 50–55 (2006)

    Article  Google Scholar 

  3. Nandiraju, D., Santhanam, L., Nandiraju, N., Agrawal, D.P.: Achieving Load Balancing in Wireless mesh network Through Multiple gateways. In: Mobile Adhoc and Sensor Systems (MASS), October 2006, pp. 807–812 (2006)

    Google Scholar 

  4. Glass, S., Portmann, M., Muthukkumarasamy, V.: Securing Wireless mesh network. Internet Computing, IEEE 12(4), 30–36 (2008)

    Article  Google Scholar 

  5. Johnson, D.B., Maltz, D.A.: Dynamic Source Routing in Ad Hoc Wireless Networks. Mobile Computing (1996)

    Google Scholar 

  6. Choi, S., Kim, D.-y., Lee, D.-h., Jung, J.-i.: WAP:Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks. In: 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, June 11-13, pp. 343–348 (2008)

    Google Scholar 

  7. Nandiraju, N.S., Nandiraju, D.S., Agrawal, D.P.: Multipath Routing in Wireless mesh network. In: Mobile Adhoc and Sensor Systems (MASS), October 2006, pp. 742–746 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, K.H., Hong, C.S. (2009). A PKI Based Mesh Router Authentication Scheme to Protect from Malicious Node in Wireless Mesh Network. In: Hong, C.S., Tonouchi, T., Ma, Y., Chao, CS. (eds) Management Enabling the Future Internet for Changing Business and New Computing Services. APNOMS 2009. Lecture Notes in Computer Science, vol 5787. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04492-2_41

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04492-2_41

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04491-5

  • Online ISBN: 978-3-642-04492-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics