Abstract
The current draft standard of 802.11s has defined routing for Wireless Mesh Networks (WMNs) in layer-2 and to differentiate from layer-3 routing, it termed layer-2 routing as path selection. The layer-2 path selection (LPS) mechanism is fully specified in the draft of IEEE 802.11s for WMNs. However, routing with security provision is not specified in the standard. Our study identifies that the current path selection mechanism is vulnerable to various types of routing attacks like flooding, route re-direction, spoofing etc. In this paper, we develop a novel Secure Layer-2 Path Selection (SLPS) mechanism that uses cryptographic extensions to provide authenticity and integrity of routing messages. Particularly, the proposed SLPS prevents unauthorized manipulation of mutable fields in the routing messages. Results from analysis and simulation demonstrate that SLPS protocol is robust against identified attacks and provides higher packet delivery ratio, requires no extra communication cost and incurs little path acquisition delay, computational and storage overhead to accomplish secure path selection.
This research was supported by the MKE under the ITRC support program supervised by the IITA” (IITA-2008-(C1090-0801-0016)).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Akyildiz, I.F., Wang, X., Wang, W.: Wireless mesh networks: a survey. Computer Networks 47(4), 445–487 (2005)
IEEE 802.11s Task Group, Draft Amendment to Standard for Information technology-Telecommunications and Information Exchange Between Systems–Local and metropolitan area networks-Specific requirements - Part 11: Wireless Lan Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Amendment IEEE p802.11s/d1.06: Mesh Networking (July 2007)
Wang, X., Lim, A.O.: IEEE 802.11s wireless mesh networks: Framework and challenges. Ad Hoc Networks 6, 970–984 (2008)
Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)
Bahr, M.: Proposed routing for ieee 802.11s wlan mesh networks. In: WICON 2006: Proceedings of the 2nd annual international workshop on Wireless internet, p. 5. ACM, New York (2006)
Bahr, M.: Update on the hybrid wireless mesh protocol of IEEE 802.11s. In: IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems, MASS 2007, pp. 1–6 (2007)
Lim, A.O., Wang, X., Kado, Y., Zhang, B.: A hybrid centralized routing protocol for 802.11s wmns. Mob. Netw. Appl. 13(1), 117–131 (2008)
Hu, Y.C., Perrig, A., Johnson, D.B.: Ariadne: a secure on-demand routing protocol for ad hoc networks. Wirel. Netw. 11(1-2), 21–38 (2005)
Perrig, A., Tygar, J.D., Song, D., Canetti, R.: Efficient authentication and signing of multicast streams over lossy channels. In: SP 2000: Proceedings of the 2000 IEEE Symposium on Security and Privacy, p. 56. IEEE Computer Society, Washington (2000)
Ács, G., Buttyán, L., Vajda, I.: Provably secure on-demand source routing in mobile ad hoc networks. IEEE Trans. Mob. Comput. 5(11), 1533–1546 (2006)
Zapata, M.G., Asokan, N.: Securing ad hoc routing protocols. In: WiSE 2002: Proceedings of the 1st ACM workshop on Wireless security, pp. 1–10. ACM, New York (2002)
Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: A secure routing protocol for ad hoc networks. In: ICNP 2002: Proceedings of the 10th IEEE International Conference on Network Protocols, pp. 78–89. IEEE Computer Society, Washington (2002)
Information Sciences Institute: NS-2 network simulator. Software Package (2003), http://www.isi.edu/nsnam/ns/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Islam, M.S., Hamid, M.A., Choi, B.G., Hong, C.S. (2009). Securing Layer-2 Path Selection in Wireless Mesh Networks . In: Chung, KI., Sohn, K., Yung, M. (eds) Information Security Applications. WISA 2008. Lecture Notes in Computer Science, vol 5379. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00306-6_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-00306-6_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-00305-9
Online ISBN: 978-3-642-00306-6
eBook Packages: Computer ScienceComputer Science (R0)