Abstract
Routing in Wireless Mesh Network has become an active field of research in recent days. Most of the existing protocols are vulnerable to many attacks. One such approach that causes serious impact on a WMN is a Fraudulent Routing Information attack known as FRI –Attack, with which an external attacker can drop all the data packets by using a single compromised mesh node. In this paper, we present a Virtual Coordinates based solution to mitigate FRI attack in WMN. Virtual Coordinate System uses the topological structure of a network to get virtual coordinates rather than getting real coordinates using GPS. The proposed mechanism is designed for an on demand routing protocols such as HWMP and it relies on digital signature to mitigate FRI attack in WMNs during route discovery. This is a software based solution and it does not require each node to be equipped with specialized hardware like GPS.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Akyildiz, I.F., Wang, X., Wang, W.: Wireless mesh networks: A survey. Computer Networks and ISDN Systems (2005)
Zhao, Y., Chen, Y., Li, B., Zhang, Q.: Hop ID: A virtual coordinate based routing for sparse mobile ad hoc networks. IEEE Transactions on Mobile Computing 6, 1075–1089 (2007)
Matam, R., Tripathy, S.: FRI-attack: Fraduelent Routing Information- Attack on wireless mesh network. In: Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief. ACM (2011)
Zhang, W., Wang, Z., Das, S.K., Hassan, M.: Security Issues in Wireless Mesh Networks. In: Wireless Mesh Networks: Architectures and Protocols. Springer (2008)
Ghosh, T., Pissinou, N., Makki, K.: Collaborative Trust Based Secure Routing against colluding malicious nodes in Multihop Ad Hoc Networks. In: Proc. of 29th Annual IEEE International Conference on Local Computer Networks, LCN 2004 (2004)
Yau, P., Mitchell, C.: 2HARP: A Secure Routing Protocol for Mobile Ad Hoc Networks. In: Proc. of the 5th World Wireless Congress, WWC 2004 (2004)
Oliviero, F., Romano, S.: A reputation-based metric for secure routing in wireless mesh networks. In: Proc. of IEEE GLOBECOM 2008, New Orleans, LA (December 2008)
Paris, S., Rotaru, C.N., Martignon, F., Capone, A.: EFW: A Cross-Layer Metric for Reliable Routing in Wireless Mesh Networks with Selfish Participants. In: Proc. of IEEE INFOCOMM, Shanghai, China (2001)
IEEE P802.11s/D5.0 Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer(PHY)Specifications, Amendment 10: Mesh Networking
Caruso, A., et al.: GPS free coordinate assignment and routing in wireless sensor networks. In: Proceedings of the IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 2005, vol. 1. IEEE (2005)
Awad, A., German, R., Dressler, F.: Exploiting virtual coordinates for improved routing performance in sensor networks. IEEE Transactions on Mobile Computing 10(9), 1214–1226 (2011)
Huang, P., Wang, C., Xiao, L.: Improving end-to-end routing performance of greedy forwarding in sensor networks. IEEE Transactions on Parallel and Distributed Systems 23(3), 556–563 (2012)
Choi, H., Zhu, S., La Porta, T.F.: SET: Detecting node clones in sensor networks. In: Third International Conference on Security and Privacy in Communications Networks and the Workshops, SecureComm 2007. IEEE (2007)
Tsai, C.-H., Chang, K.-T., Tsai, C.-H., Wang, Y.-H.: A Routing Mechanism Using Virtual Coordination Anchor Node Apply to Wireless Sensor Networks. In: Park, J.J.(J.H.), Arabnia, H.R., Kim, C., Shi, W., Gil, J.-M. (eds.) GPC 2013. LNCS, vol. 7861, pp. 546–555. Springer, Heidelberg (2013)
Xing, K., et al.: Real-time detection of clone attacks in wireless sensor networks. In: The 28th International Conference on Distributed Computing Systems, ICDCS 2008. IEEE (2008)
Conti, M., et al.: Distributed detection of clone attacks in wireless sensor networks. IEEE Transactions on Dependable and Secure Computing 8(5), 685–698 (2011)
Li, Z., Gong, G.: On the node clone detection in wireless sensor networks. IEEE/ACM Transactions on Networking (TON) 21(6), 1799–1811 (2013)
Bahr, M.: Proposed routing for IEEE 802.11 s WLAN mesh networks. In: Proceedings of the 2nd Annual International Workshop on Wireless Internet. ACM (2006)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Subhash, P., Ramachandram, S. (2015). Mitigating FRI-Attack Using Virtual Co-ordinate System in Multi-hop Wireless Mesh Networks. In: Satapathy, S., Govardhan, A., Raju, K., Mandal, J. (eds) Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Society of India CSI Volume 2. Advances in Intelligent Systems and Computing, vol 338. Springer, Cham. https://doi.org/10.1007/978-3-319-13731-5_36
Download citation
DOI: https://doi.org/10.1007/978-3-319-13731-5_36
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-13730-8
Online ISBN: 978-3-319-13731-5
eBook Packages: EngineeringEngineering (R0)