Skip to main content

Securing Layer-2 Path Selection in Wireless Mesh Networks

  • Conference paper
Book cover Information Security Applications (WISA 2008)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5379))

Included in the following conference series:

Abstract

The current draft standard of 802.11s has defined routing for Wireless Mesh Networks (WMNs) in layer-2 and to differentiate from layer-3 routing, it termed layer-2 routing as path selection. The layer-2 path selection (LPS) mechanism is fully specified in the draft of IEEE 802.11s for WMNs. However, routing with security provision is not specified in the standard. Our study identifies that the current path selection mechanism is vulnerable to various types of routing attacks like flooding, route re-direction, spoofing etc. In this paper, we develop a novel Secure Layer-2 Path Selection (SLPS) mechanism that uses cryptographic extensions to provide authenticity and integrity of routing messages. Particularly, the proposed SLPS prevents unauthorized manipulation of mutable fields in the routing messages. Results from analysis and simulation demonstrate that SLPS protocol is robust against identified attacks and provides higher packet delivery ratio, requires no extra communication cost and incurs little path acquisition delay, computational and storage overhead to accomplish secure path selection.

This research was supported by the MKE under the ITRC support program supervised by the IITA” (IITA-2008-(C1090-0801-0016)).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akyildiz, I.F., Wang, X., Wang, W.: Wireless mesh networks: a survey. Computer Networks 47(4), 445–487 (2005)

    Article  MATH  Google Scholar 

  2. IEEE 802.11s Task Group, Draft Amendment to Standard for Information technology-Telecommunications and Information Exchange Between Systems–Local and metropolitan area networks-Specific requirements - Part 11: Wireless Lan Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Amendment IEEE p802.11s/d1.06: Mesh Networking (July 2007)

    Google Scholar 

  3. Wang, X., Lim, A.O.: IEEE 802.11s wireless mesh networks: Framework and challenges. Ad Hoc Networks 6, 970–984 (2008)

    Article  Google Scholar 

  4. Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)

    Google Scholar 

  5. Bahr, M.: Proposed routing for ieee 802.11s wlan mesh networks. In: WICON 2006: Proceedings of the 2nd annual international workshop on Wireless internet, p. 5. ACM, New York (2006)

    Google Scholar 

  6. Bahr, M.: Update on the hybrid wireless mesh protocol of IEEE 802.11s. In: IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems, MASS 2007, pp. 1–6 (2007)

    Google Scholar 

  7. Lim, A.O., Wang, X., Kado, Y., Zhang, B.: A hybrid centralized routing protocol for 802.11s wmns. Mob. Netw. Appl. 13(1), 117–131 (2008)

    Article  Google Scholar 

  8. Hu, Y.C., Perrig, A., Johnson, D.B.: Ariadne: a secure on-demand routing protocol for ad hoc networks. Wirel. Netw. 11(1-2), 21–38 (2005)

    Article  Google Scholar 

  9. Perrig, A., Tygar, J.D., Song, D., Canetti, R.: Efficient authentication and signing of multicast streams over lossy channels. In: SP 2000: Proceedings of the 2000 IEEE Symposium on Security and Privacy, p. 56. IEEE Computer Society, Washington (2000)

    Chapter  Google Scholar 

  10. Ács, G., Buttyán, L., Vajda, I.: Provably secure on-demand source routing in mobile ad hoc networks. IEEE Trans. Mob. Comput. 5(11), 1533–1546 (2006)

    Article  Google Scholar 

  11. Zapata, M.G., Asokan, N.: Securing ad hoc routing protocols. In: WiSE 2002: Proceedings of the 1st ACM workshop on Wireless security, pp. 1–10. ACM, New York (2002)

    Google Scholar 

  12. Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: A secure routing protocol for ad hoc networks. In: ICNP 2002: Proceedings of the 10th IEEE International Conference on Network Protocols, pp. 78–89. IEEE Computer Society, Washington (2002)

    Chapter  Google Scholar 

  13. Information Sciences Institute: NS-2 network simulator. Software Package (2003), http://www.isi.edu/nsnam/ns/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Islam, M.S., Hamid, M.A., Choi, B.G., Hong, C.S. (2009). Securing Layer-2 Path Selection in Wireless Mesh Networks . In: Chung, KI., Sohn, K., Yung, M. (eds) Information Security Applications. WISA 2008. Lecture Notes in Computer Science, vol 5379. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00306-6_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-00306-6_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-00305-9

  • Online ISBN: 978-3-642-00306-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics