Skip to main content
Erschienen in: Wireless Networks 6/2017

19.03.2016

Wormhole-Free Routing and DoS Attack Defense in Wireless Mesh Networks

verfasst von: G. Akilarasu, S. Mercy Shalinie

Erschienen in: Wireless Networks | Ausgabe 6/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Owing to the growth in several applications, Wireless Mesh Networks (WMN) is emerging as a vital technology for future wireless networks. Wormhole attack is one of the major security threats, which can disturb majority of routing communications, even when placed strategically. Therefore, a technique that can find wormhole-free routes in the network is required. In order to achieve this, in this paper, we propose a Monitoring Technique for Wormhole-Free Routing and DoS Attack Defense in WMNs. Initially, finite state model is applied where the node keeps the information about its sender and neighborhood receiver. Then, wormhole-aware secure routing is implemented to find wormhole free routes in the network. Finally, the priority mechanism is applied where the data packets are transmitted based on their priority. Based on the finite state model and priority mechanism, the malicious or wormhole nodes in the network are removed.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Jayanthi, M., & Mukunthan, M. A. (2012). A security architecture for implementing anonymity and traceability in wireless mesh network using clustering concept. International Journal of Soft Computing and Engineering (IJSCE). ISSN: 2231-2307, vol 1, Issue-ETIC-2011. Jayanthi, M., & Mukunthan, M. A. (2012). A security architecture for implementing anonymity and traceability in wireless mesh network using clustering concept. International Journal of Soft Computing and Engineering (IJSCE). ISSN: 2231-2307, vol 1, Issue-ETIC-2011.
2.
Zurück zum Zitat Li, C., Wang, Z., & Yang, C. (2011). Secure routing for wireless mesh networks. International Journal of Network Security, 13(2), 109–120. Li, C., Wang, Z., & Yang, C. (2011). Secure routing for wireless mesh networks. International Journal of Network Security, 13(2), 109–120.
3.
Zurück zum Zitat Oliviero, F., & Romano, S. P. (2008). A reputation-based metric for secure routing in wireless mesh networks. In IEEE “GLOBECOM”, 978-1-4244-2324-8/08/$25.00 ©. IEEE. Oliviero, F., & Romano, S. P. (2008). A reputation-based metric for secure routing in wireless mesh networks. In IEEE “GLOBECOM”, 978-1-4244-2324-8/08/$25.00 ©. IEEE.
4.
Zurück zum Zitat Lin, H., Ma, J., Hu, J., & Yang, K. (2012). PA-SHWMP: A privacy-aware secure hybrid wireless mesh protocol for IEEE 802.11s wireless mesh networks. EURASIP Journal on Wireless Communications and Networking. doi:10.1186/1687-1499-2012-69. Lin, H., Ma, J., Hu, J., & Yang, K. (2012). PA-SHWMP: A privacy-aware secure hybrid wireless mesh protocol for IEEE 802.11s wireless mesh networks. EURASIP Journal on Wireless Communications and Networking. doi:10.​1186/​1687-1499-2012-69.
5.
Zurück zum Zitat Khan, K., & Akbar, M. (2008). Authentication in multi-hop wireless mesh networks. World Academy of Science, Engineering and Technology, 2(10). Khan, K., & Akbar, M. (2008). Authentication in multi-hop wireless mesh networks. World Academy of Science, Engineering and Technology, 2(10).
6.
Zurück zum Zitat Zeng, Y., et al. (2013). Directional routing and scheduling for green vehicular delay tolerant networks. Wireless Networks, 19(2), 161–173.CrossRef Zeng, Y., et al. (2013). Directional routing and scheduling for green vehicular delay tolerant networks. Wireless Networks, 19(2), 161–173.CrossRef
7.
Zurück zum Zitat Jing, Q., et al. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20(8), 2481–2501.CrossRef Jing, Q., et al. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20(8), 2481–2501.CrossRef
8.
Zurück zum Zitat Wang, X., et al. (2012). A survey of green mobile networks: Opportunities and challenges. MONET, 17(1), 4–20. Wang, X., et al. (2012). A survey of green mobile networks: Opportunities and challenges. MONET, 17(1), 4–20.
10.
Zurück zum Zitat Li, P. et al. (2012). CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding. In INFOCOM (pp. 100–108). Li, P. et al. (2012). CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding. In INFOCOM (pp. 100–108).
11.
Zurück zum Zitat Song, Y., et al. (2014). A biology-based algorithm to minimal exposure problem of wireless sensor networks. IEEE Transactions on Network and Service Management, 11(3), 417–430.MathSciNetCrossRef Song, Y., et al. (2014). A biology-based algorithm to minimal exposure problem of wireless sensor networks. IEEE Transactions on Network and Service Management, 11(3), 417–430.MathSciNetCrossRef
12.
Zurück zum Zitat Liu, L., et al. (2015). Physarum optimization: A biology-inspired algorithm for the steiner tree problem in networks. IEEE Transactions on Computers, 64(3), 819–832.MathSciNetMATH Liu, L., et al. (2015). Physarum optimization: A biology-inspired algorithm for the steiner tree problem in networks. IEEE Transactions on Computers, 64(3), 819–832.MathSciNetMATH
13.
Zurück zum Zitat Liu, Y., et al. (2010). Multi-layer clustering routing algorithm for wireless vehicular sensor networks. IET Communications, 4(7), 810–816.CrossRef Liu, Y., et al. (2010). Multi-layer clustering routing algorithm for wireless vehicular sensor networks. IET Communications, 4(7), 810–816.CrossRef
14.
Zurück zum Zitat Busch, C., et al. (2012). Approximating congestion + dilation in networks via “quality of routing” games. IEEE Transactions on Computers, 61(9), 1270–1283.MathSciNetCrossRef Busch, C., et al. (2012). Approximating congestion + dilation in networks via “quality of routing” games. IEEE Transactions on Computers, 61(9), 1270–1283.MathSciNetCrossRef
15.
Zurück zum Zitat Li, P., et al. (2014). Reliable multicast with pipelined network coding using opportunistic feeding and routing. IEEE Transactions on Parallel and Distributed Systems, 25(12), 3264–3273.CrossRef Li, P., et al. (2014). Reliable multicast with pipelined network coding using opportunistic feeding and routing. IEEE Transactions on Parallel and Distributed Systems, 25(12), 3264–3273.CrossRef
17.
Zurück zum Zitat Dvir, A., et al. (2011). Backpressure-based routing protocol for DTNs. ACM SIGCOMM Computer Communication Review, 41(4), 405–406. Dvir, A., et al. (2011). Backpressure-based routing protocol for DTNs. ACM SIGCOMM Computer Communication Review, 41(4), 405–406.
18.
Zurück zum Zitat Yen, Y.-S., et al. (2011). Flooding-limited and multi-constrained QoS multicast routing based on the genetic algorithm for MANETs. Mathematical and Computer Modelling, 53(11–12), 2238–2250.CrossRef Yen, Y.-S., et al. (2011). Flooding-limited and multi-constrained QoS multicast routing based on the genetic algorithm for MANETs. Mathematical and Computer Modelling, 53(11–12), 2238–2250.CrossRef
19.
Zurück zum Zitat Sen, J. (2013). Secure and privacy-preserving authentication protocols for wireless mesh networks. Innovation Lab, Tata Consultancy Services Ltd. eprint arXiv: 1209.1803, Publication Date: 09/2012. doi:10.5772/39176. www.intechopen.com. Sen, J. (2013). Secure and privacy-preserving authentication protocols for wireless mesh networks. Innovation Lab, Tata Consultancy Services Ltd. eprint arXiv: 1209.1803, Publication Date: 09/2012. doi:10.​5772/​39176. www.​intechopen.​com.
20.
Zurück zum Zitat Redwan, H., & Kim, K.-H. (2008). Survey of security requirements, attacks and network integration in wireless mesh networks. 978-0-7695-3540-1/08 $25.00 © 2008 IEEE. doi:10.1109/FCST.2008. Redwan, H., & Kim, K.-H. (2008). Survey of security requirements, attacks and network integration in wireless mesh networks. 978-0-7695-3540-1/08 $25.00 © 2008 IEEE. doi:10.​1109/​FCST.​2008.
21.
Zurück zum Zitat Spyropoulos, T., et al. (2010). Routing for disruption tolerant networks: Taxonomy and design. Wireless Networks, 16(8), 2349–2370.CrossRef Spyropoulos, T., et al. (2010). Routing for disruption tolerant networks: Taxonomy and design. Wireless Networks, 16(8), 2349–2370.CrossRef
22.
Zurück zum Zitat Vasilakos, A., et al. (2012). Delay tolerant networks: Protocols and applications. Boca Raton: CRC Press. Vasilakos, A., et al. (2012). Delay tolerant networks: Protocols and applications. Boca Raton: CRC Press.
23.
Zurück zum Zitat Youssef, M., et al. (2014). Routing metrics of cognitive radio networks: A survey. IEEE Communications Surveys and Tutorials, 16(1), 92–109.MathSciNetCrossRef Youssef, M., et al. (2014). Routing metrics of cognitive radio networks: A survey. IEEE Communications Surveys and Tutorials, 16(1), 92–109.MathSciNetCrossRef
24.
25.
Zurück zum Zitat Zhang, X. M., et al. (2015). Interference-based topology control algorithm for delay-constrained mobile Ad hoc networks. IEEE Transactions on Mobile Computing, 14(4), 742–754.CrossRef Zhang, X. M., et al. (2015). Interference-based topology control algorithm for delay-constrained mobile Ad hoc networks. IEEE Transactions on Mobile Computing, 14(4), 742–754.CrossRef
26.
Zurück zum Zitat Duarte, P. B. F., et al. (2012). On the partially overlapped channel assignment on wireless mesh network backbone: A game theoretic approach. IEEE Journal on Selected Areas in Communications, 30(1), 119–127.CrossRef Duarte, P. B. F., et al. (2012). On the partially overlapped channel assignment on wireless mesh network backbone: A game theoretic approach. IEEE Journal on Selected Areas in Communications, 30(1), 119–127.CrossRef
27.
Zurück zum Zitat Attar, A., et al. (2012). A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE, 100(12), 3172–3186.CrossRef Attar, A., et al. (2012). A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE, 100(12), 3172–3186.CrossRef
28.
Zurück zum Zitat Vasilakos, A. V., et al. (2015). Information centric network: Research challenges and opportunities. Journal of Network and Computer Applications, 52, 1–10.CrossRef Vasilakos, A. V., et al. (2015). Information centric network: Research challenges and opportunities. Journal of Network and Computer Applications, 52, 1–10.CrossRef
29.
Zurück zum Zitat Yao, Y. et al. (2013) EDAL: An energy-efficient, delay-aware, and lifetime-balancing data collection protocol for wireless sensor networks. In MASS 1(pp. 82–190). Yao, Y. et al. (2013) EDAL: An energy-efficient, delay-aware, and lifetime-balancing data collection protocol for wireless sensor networks. In MASS 1(pp. 82–190).
30.
Zurück zum Zitat Marwaha, S. et al. (2004). Evolutionary fuzzy multi-objective routing for wireless mobile ad hoc networks. In Evolutionary Computation, 2004. CEC2004. Congress on. (Vol. 2, pp. 1964–1971). Marwaha, S. et al. (2004). Evolutionary fuzzy multi-objective routing for wireless mobile ad hoc networks. In Evolutionary Computation, 2004. CEC2004. Congress on. (Vol. 2, pp. 1964–1971).
31.
Zurück zum Zitat Vasilakos, A. et al. (2003). Optimizing QoS routing in hierarchical ATM networks using computational intelligence techniques. IEEE Systems, Man, and Cybernetics, Part C: Applications and Reviews. Vasilakos, A. et al. (2003). Optimizing QoS routing in hierarchical ATM networks using computational intelligence techniques. IEEE Systems, Man, and Cybernetics, Part C: Applications and Reviews.
32.
Zurück zum Zitat Quan, W. et al. (2014). TB2F: Tree-bitmap and bloom-filter for a scalable and efficient name lookup in content-centric networking. In IFIP Networking. Quan, W. et al. (2014). TB2F: Tree-bitmap and bloom-filter for a scalable and efficient name lookup in content-centric networking. In IFIP Networking.
33.
Zurück zum Zitat Aswal, M. S., Rawat, P., & Kumar, T. (2009). Threats and vulnerabilities in wireless mesh networks. International Journal of Recent Trends in Engineering, 2(4). Aswal, M. S., Rawat, P., & Kumar, T. (2009). Threats and vulnerabilities in wireless mesh networks. International Journal of Recent Trends in Engineering, 2(4).
34.
Zurück zum Zitat Yao, G., et al. (2015). Passive IP traceback: Disclosing the locations of IP spoofers from path backscatter. IEEE Transactions on Information Forensics and Security, 10(3), 471–484.MathSciNetCrossRef Yao, G., et al. (2015). Passive IP traceback: Disclosing the locations of IP spoofers from path backscatter. IEEE Transactions on Information Forensics and Security, 10(3), 471–484.MathSciNetCrossRef
35.
Zurück zum Zitat Yang, H., et al. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29–38.CrossRef Yang, H., et al. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29–38.CrossRef
36.
Zurück zum Zitat Liu, B., et al. (2014). Toward incentivizing anti-spoofing deployment. IEEE Transactions on Information Forensics and Security, 9(3), 436–450.CrossRef Liu, B., et al. (2014). Toward incentivizing anti-spoofing deployment. IEEE Transactions on Information Forensics and Security, 9(3), 436–450.CrossRef
37.
Zurück zum Zitat Zhou, J., et al. (2015). Secure and privacy preserving protocol for cloud-based vehicular DTNs. IEEE Transactions on Information Forensics and Security, 10(6), 1299–1314.CrossRef Zhou, J., et al. (2015). Secure and privacy preserving protocol for cloud-based vehicular DTNs. IEEE Transactions on Information Forensics and Security, 10(6), 1299–1314.CrossRef
38.
Zurück zum Zitat Liu, J., et al. (2016). Leveraging software-defined networking for security policy enforcement. Information Sciences, 327, 288–299.CrossRef Liu, J., et al. (2016). Leveraging software-defined networking for security policy enforcement. Information Sciences, 327, 288–299.CrossRef
39.
Zurück zum Zitat Luan, L., Fu, Y., & Xiao, P. (2012). An effective denial of service attack detection method in wireless mesh networks. Physics Procedia, 33, 354–360.CrossRef Luan, L., Fu, Y., & Xiao, P. (2012). An effective denial of service attack detection method in wireless mesh networks. Physics Procedia, 33, 354–360.CrossRef
40.
Zurück zum Zitat Bansal, D., Sofat, S., & Singh, G. (2010). Secure routing protocol for hybrid wireless mesh network (HWMN). In Computer and Communication Technology (ICCCT), 2010 International Conference (pp. 837–843). Print ISBN: 978-1-4244-9033-2, 978-1-4244-9034/10/$26.00©2010 IEEE, 17–19 Sept. 2010. Bansal, D., Sofat, S., & Singh, G. (2010). Secure routing protocol for hybrid wireless mesh network (HWMN). In Computer and Communication Technology (ICCCT), 2010 International Conference (pp. 837–843). Print ISBN: 978-1-4244-9033-2, 978-1-4244-9034/10/$26.00©2010 IEEE, 17–19 Sept. 2010.
41.
Zurück zum Zitat Kandah, F., Singh, Y., & Zhang, W. (2012). Mitigating eavesdropping attack using secure key management scheme in wireless mesh networks. Journal of Communications, 7(8), 596–605.CrossRef Kandah, F., Singh, Y., & Zhang, W. (2012). Mitigating eavesdropping attack using secure key management scheme in wireless mesh networks. Journal of Communications, 7(8), 596–605.CrossRef
42.
Zurück zum Zitat Matam, R., & Tripathy, S. (2013). WRSR: Wormhole-resistant secure routing for wireless mesh networks. EURASIP Journal on Wireless Communications and Networking. Matam, R., & Tripathy, S. (2013). WRSR: Wormhole-resistant secure routing for wireless mesh networks. EURASIP Journal on Wireless Communications and Networking.
43.
Zurück zum Zitat Sen, J. (2010). Efficient routing anomaly detection in wireless mesh networks. In First International Conference on Integrated Intelligent Computing, 978-0-7695-4152-5/10 $26.00 © 2010 IEEE. Sen, J. (2010). Efficient routing anomaly detection in wireless mesh networks. In First International Conference on Integrated Intelligent Computing, 978-0-7695-4152-5/10 $26.00 © 2010 IEEE.
Metadaten
Titel
Wormhole-Free Routing and DoS Attack Defense in Wireless Mesh Networks
verfasst von
G. Akilarasu
S. Mercy Shalinie
Publikationsdatum
19.03.2016
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 6/2017
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-016-1240-0

Weitere Artikel der Ausgabe 6/2017

Wireless Networks 6/2017 Zur Ausgabe

Neuer Inhalt