Skip to main content
Erschienen in: Annals of Telecommunications 5-6/2009

01.06.2009

A robust security scheme for wireless mesh enterprise networks

verfasst von: Md. Abdul Hamid, M. Abdullah-Al-Wadud, Choong Seon Hong, Oksam Chae, Sungwon Lee

Erschienen in: Annals of Telecommunications | Ausgabe 5-6/2009

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, we address the security challenges for wireless mesh enterprise networks (WMENs). The topology and communication characteristics of WMEN include the following: (a) deployment of the network devices are not planar, rather, devices are deployed over three-dimensional space (e.g., office buildings, shopping malls, grocery stores, etc.); (b) messages, generated/received by a mesh client, traverse through mesh routers in a multihop fashion; and (c) mesh clients, being mostly mobile in nature, may result in misbehaving or be spurious during communications. We propose a security scheme for WMEN in order to ensure that only authorized users are granted network access. Particularly, our scheme includes: (a) a deterministic key distribution technique that perfectly suits the network topology, (b) an efficient session key establishment protocol to achieve the client–router and router–router communications security, and (c) a distributed detection mechanism to identify malicious clients in the network. Analytical and simulation results are presented to verify our proposed solutions.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Akyildiz IF, Wang X, Wang W (2005) Wireless mesh networks: a survey. Comput Networks 47(4):445–487MATHCrossRef Akyildiz IF, Wang X, Wang W (2005) Wireless mesh networks: a survey. Comput Networks 47(4):445–487MATHCrossRef
2.
Zurück zum Zitat Yang L, Zerfos P, Sadot E (2005) Architecture taxonomy for control and provisioning of wireless access points (capwap). IETF RFC 4118 Yang L, Zerfos P, Sadot E (2005) Architecture taxonomy for control and provisioning of wireless access points (capwap). IETF RFC 4118
3.
Zurück zum Zitat Alam SMN, Haas ZJ (2006) Coverage and connectivity in three-dimensional networks. In: MOBICOM, Los Angeles, 23–29 September 2006, pp 346–357 Alam SMN, Haas ZJ (2006) Coverage and connectivity in three-dimensional networks. In: MOBICOM, Los Angeles, 23–29 September 2006, pp 346–357
4.
Zurück zum Zitat Ben Salem N, Hubaux JP (2006) Securing wireless mesh networks. IEEE Wirel Commun 13(2):50–55CrossRef Ben Salem N, Hubaux JP (2006) Securing wireless mesh networks. IEEE Wirel Commun 13(2):50–55CrossRef
5.
Zurück zum Zitat LAN/MAN Standards Committee, ANSI/IEEE Std 802.11 (1999) Wireless LAN medium access control (MAC) and physical layer (PHY) specifications. IEEE Computer Society, Los Alamitos LAN/MAN Standards Committee, ANSI/IEEE Std 802.11 (1999) Wireless LAN medium access control (MAC) and physical layer (PHY) specifications. IEEE Computer Society, Los Alamitos
6.
Zurück zum Zitat Radosavac S, Baras JS, Koutsopoulos I (2005) A framework for mac protocol misbehavior detection in wireless networks. In: WiSe ’05: proceedings of the 4th ACM workshop on wireless security. ACM, New York, pp 33–42CrossRef Radosavac S, Baras JS, Koutsopoulos I (2005) A framework for mac protocol misbehavior detection in wireless networks. In: WiSe ’05: proceedings of the 4th ACM workshop on wireless security. ACM, New York, pp 33–42CrossRef
7.
Zurück zum Zitat Cagalj M, Ganeriwal S, Aad I, Hubaux JP (2005) On selfish behavior in CSMA/CA networks. In: INFOCOM, Miami, 13–17 March 2005, pp 2513–2524 Cagalj M, Ganeriwal S, Aad I, Hubaux JP (2005) On selfish behavior in CSMA/CA networks. In: INFOCOM, Miami, 13–17 March 2005, pp 2513–2524
8.
Zurück zum Zitat Hamid M, Islam M, Hong CS (2008) Developing security solutions for wireless mesh enterprise networks. In: IEEE wireless communications and networking conference, 2008 (WCNC ’08), Las Vegas, 31 March–3 April 2008, pp 2549–2554 Hamid M, Islam M, Hong CS (2008) Developing security solutions for wireless mesh enterprise networks. In: IEEE wireless communications and networking conference, 2008 (WCNC ’08), Las Vegas, 31 March–3 April 2008, pp 2549–2554
9.
Zurück zum Zitat Zhang Y, Fang Y (2006) Arsa: an attack-resilient security architecture for multihop wireless mesh networks. IEEE J Sel Areas Commun 24(10):1916–1928CrossRefMathSciNet Zhang Y, Fang Y (2006) Arsa: an attack-resilient security architecture for multihop wireless mesh networks. IEEE J Sel Areas Commun 24(10):1916–1928CrossRefMathSciNet
10.
Zurück zum Zitat Wu X, Li N (2006) Achieving privacy in mesh networks. In: SASN ’06: proceedings of the fourth ACM workshop on security of ad hoc and sensor networks. ACM, New York, pp 13–22CrossRef Wu X, Li N (2006) Achieving privacy in mesh networks. In: SASN ’06: proceedings of the fourth ACM workshop on security of ad hoc and sensor networks. ACM, New York, pp 13–22CrossRef
11.
Zurück zum Zitat Wu T, Xue Y, Cui Y (2006) Preserving traffic privacy in wireless mesh networks. In: WOWMOM ’06: proceedings of the 2006 international symposium on world of wireless, mobile and multimedia networks. IEEE Computer Society, Washington, DC, pp 459–461 Wu T, Xue Y, Cui Y (2006) Preserving traffic privacy in wireless mesh networks. In: WOWMOM ’06: proceedings of the 2006 international symposium on world of wireless, mobile and multimedia networks. IEEE Computer Society, Washington, DC, pp 459–461
12.
Zurück zum Zitat Tague P, Poovendran R (2007) Modeling adaptive node capture attacks in multi-hop wireless networks. Ad Hoc Netw 5(6):801–814CrossRef Tague P, Poovendran R (2007) Modeling adaptive node capture attacks in multi-hop wireless networks. Ad Hoc Netw 5(6):801–814CrossRef
13.
Zurück zum Zitat Santhanam L, Nandiraju D, Nandiraju N, Agrawal D (2007) Active cache based defense against dos attacks in wireless mesh network. In: Wireless pervasive computing, 2007. ISWPC ’07. 2nd international symposium, San Juan, 5–7 February 2007 Santhanam L, Nandiraju D, Nandiraju N, Agrawal D (2007) Active cache based defense against dos attacks in wireless mesh network. In: Wireless pervasive computing, 2007. ISWPC ’07. 2nd international symposium, San Juan, 5–7 February 2007
14.
Zurück zum Zitat Li H, Xu M, Li Y (2007) Selfish mac layer misbehavior detection model for the ieee 802.11-based wireless mesh networks. In: Proceedings of advanced parallel programming technologies (APPT ’07), vol. 4847. Springer, Berlin Heidelberg New York, pp 382–391CrossRef Li H, Xu M, Li Y (2007) Selfish mac layer misbehavior detection model for the ieee 802.11-based wireless mesh networks. In: Proceedings of advanced parallel programming technologies (APPT ’07), vol. 4847. Springer, Berlin Heidelberg New York, pp 382–391CrossRef
15.
Zurück zum Zitat Dong J, Ackermann KE, Bavar B, Nita-Rotaru C (2008) Mitigating attacks against virtual coordinate based routing in wireless sensor networks. In: WiSec ’08: proceedings of the first ACM conference on wireless network security. ACM, New York, pp 89–99CrossRef Dong J, Ackermann KE, Bavar B, Nita-Rotaru C (2008) Mitigating attacks against virtual coordinate based routing in wireless sensor networks. In: WiSec ’08: proceedings of the first ACM conference on wireless network security. ACM, New York, pp 89–99CrossRef
16.
Zurück zum Zitat Lowry R (2006) Concepts and applications of inferential statistics. Vassar College, Poughkeepsie Lowry R (2006) Concepts and applications of inferential statistics. Vassar College, Poughkeepsie
17.
Zurück zum Zitat Ravelomanana V (2004) Extremal properties of three-dimensional sensor networks with applications. IEEE Trans Mob Comput 3(3):246–257CrossRef Ravelomanana V (2004) Extremal properties of three-dimensional sensor networks with applications. IEEE Trans Mob Comput 3(3):246–257CrossRef
18.
Zurück zum Zitat Bahramgiri M, Hajiaghayi M, Mirrokni VS (2006) Fault-tolerant and 3-dimensional distributed topology control algorithms in wireless multi-hop networks. Wirel Netw 12(2):179–188CrossRef Bahramgiri M, Hajiaghayi M, Mirrokni VS (2006) Fault-tolerant and 3-dimensional distributed topology control algorithms in wireless multi-hop networks. Wirel Netw 12(2):179–188CrossRef
19.
Zurück zum Zitat Gupta P, Kumar PR (2001) Internet in the sky: the capacity of three dimensional wireless networks. Commun Inf Syst 1:33–49MATHMathSciNet Gupta P, Kumar PR (2001) Internet in the sky: the capacity of three dimensional wireless networks. Commun Inf Syst 1:33–49MATHMathSciNet
20.
Zurück zum Zitat Cao Q, Abdelzaher T (2006) Scalable logical coordinates framework for routing in wireless sensor networks. ACM Trans Sen Netw 2(4):557–593CrossRef Cao Q, Abdelzaher T (2006) Scalable logical coordinates framework for routing in wireless sensor networks. ACM Trans Sen Netw 2(4):557–593CrossRef
21.
Zurück zum Zitat Akyildiz IF, Pompili D, Melodia T (2005) Underwater acoustic sensor networks: research challenges. Ad Hoc Netw J (Elsevier) 3(3):257–279CrossRef Akyildiz IF, Pompili D, Melodia T (2005) Underwater acoustic sensor networks: research challenges. Ad Hoc Netw J (Elsevier) 3(3):257–279CrossRef
22.
Zurück zum Zitat Carle J, Myoupo JF, Semé D (2001) A basis for 3-D cellular networks. In: ICOIN ’01: proceedings of the 15th international conference on information networking. IEEE Computer Society, Washington, DC, p 631CrossRef Carle J, Myoupo JF, Semé D (2001) A basis for 3-D cellular networks. In: ICOIN ’01: proceedings of the 15th international conference on information networking. IEEE Computer Society, Washington, DC, p 631CrossRef
23.
Zurück zum Zitat Decayeux C, Seme D (2004) A new model for 3-D cellular mobile networks. In: ISPDC ’04: proceedings of the third international symposium on parallel and distributed computing/third international workshop on algorithms, models and tools for parallel computing on heterogeneous networks. IEEE Computer Society, Washington, DC, pp 22–28CrossRef Decayeux C, Seme D (2004) A new model for 3-D cellular mobile networks. In: ISPDC ’04: proceedings of the third international symposium on parallel and distributed computing/third international workshop on algorithms, models and tools for parallel computing on heterogeneous networks. IEEE Computer Society, Washington, DC, pp 22–28CrossRef
24.
Zurück zum Zitat IEEE 802.11s Task Group (2007) Draft amendment to standard for information technology telecommunications and information exchange between systems - LAN/MAN specific requirements - Part 11: wireless medium access control (MAC) and physical layer (PHY) specifications: Amendment: ESS Mesh Networking, IEEE P802.11s/D1.06 IEEE 802.11s Task Group (2007) Draft amendment to standard for information technology telecommunications and information exchange between systems - LAN/MAN specific requirements - Part 11: wireless medium access control (MAC) and physical layer (PHY) specifications: Amendment: ESS Mesh Networking, IEEE P802.11s/D1.06
26.
Zurück zum Zitat IEEE Standard 802.1X-2004 (2004) Standard for local and metropolitan area networks: port-based network access control. IEEE, Piscataway IEEE Standard 802.1X-2004 (2004) Standard for local and metropolitan area networks: port-based network access control. IEEE, Piscataway
27.
Zurück zum Zitat P̧ostel J (1981) Internet control message protocol (ICMP). RFC 792 P̧ostel J (1981) Internet control message protocol (ICMP). RFC 792
28.
Zurück zum Zitat Çamtepe SA, Yener B (2007) Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE/ACM Trans Netw 15(2):346–358CrossRef Çamtepe SA, Yener B (2007) Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE/ACM Trans Netw 15(2):346–358CrossRef
Metadaten
Titel
A robust security scheme for wireless mesh enterprise networks
verfasst von
Md. Abdul Hamid
M. Abdullah-Al-Wadud
Choong Seon Hong
Oksam Chae
Sungwon Lee
Publikationsdatum
01.06.2009
Verlag
Springer-Verlag
Erschienen in
Annals of Telecommunications / Ausgabe 5-6/2009
Print ISSN: 0003-4347
Elektronische ISSN: 1958-9395
DOI
https://doi.org/10.1007/s12243-008-0084-8

Weitere Artikel der Ausgabe 5-6/2009

Annals of Telecommunications 5-6/2009 Zur Ausgabe

EditorialNotes

Foreword

Premium Partner