Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 338))

  • 2319 Accesses

Abstract

Routing in Wireless Mesh Network has become an active field of research in recent days. Most of the existing protocols are vulnerable to many attacks. One such approach that causes serious impact on a WMN is a Fraudulent Routing Information attack known as FRI –Attack, with which an external attacker can drop all the data packets by using a single compromised mesh node. In this paper, we present a Virtual Coordinates based solution to mitigate FRI attack in WMN. Virtual Coordinate System uses the topological structure of a network to get virtual coordinates rather than getting real coordinates using GPS. The proposed mechanism is designed for an on demand routing protocols such as HWMP and it relies on digital signature to mitigate FRI attack in WMNs during route discovery. This is a software based solution and it does not require each node to be equipped with specialized hardware like GPS.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akyildiz, I.F., Wang, X., Wang, W.: Wireless mesh networks: A survey. Computer Networks and ISDN Systems (2005)

    Google Scholar 

  2. Zhao, Y., Chen, Y., Li, B., Zhang, Q.: Hop ID: A virtual coordinate based routing for sparse mobile ad hoc networks. IEEE Transactions on Mobile Computing 6, 1075–1089 (2007)

    Article  Google Scholar 

  3. Matam, R., Tripathy, S.: FRI-attack: Fraduelent Routing Information- Attack on wireless mesh network. In: Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief. ACM (2011)

    Google Scholar 

  4. Zhang, W., Wang, Z., Das, S.K., Hassan, M.: Security Issues in Wireless Mesh Networks. In: Wireless Mesh Networks: Architectures and Protocols. Springer (2008)

    Google Scholar 

  5. Ghosh, T., Pissinou, N., Makki, K.: Collaborative Trust Based Secure Routing against colluding malicious nodes in Multihop Ad Hoc Networks. In: Proc. of 29th Annual IEEE International Conference on Local Computer Networks, LCN 2004 (2004)

    Google Scholar 

  6. Yau, P., Mitchell, C.: 2HARP: A Secure Routing Protocol for Mobile Ad Hoc Networks. In: Proc. of the 5th World Wireless Congress, WWC 2004 (2004)

    Google Scholar 

  7. Oliviero, F., Romano, S.: A reputation-based metric for secure routing in wireless mesh networks. In: Proc. of IEEE GLOBECOM 2008, New Orleans, LA (December 2008)

    Google Scholar 

  8. Paris, S., Rotaru, C.N., Martignon, F., Capone, A.: EFW: A Cross-Layer Metric for Reliable Routing in Wireless Mesh Networks with Selfish Participants. In: Proc. of IEEE INFOCOMM, Shanghai, China (2001)

    Google Scholar 

  9. IEEE P802.11s/D5.0 Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer(PHY)Specifications, Amendment 10: Mesh Networking

    Google Scholar 

  10. Caruso, A., et al.: GPS free coordinate assignment and routing in wireless sensor networks. In: Proceedings of the IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 2005, vol. 1. IEEE (2005)

    Google Scholar 

  11. Awad, A., German, R., Dressler, F.: Exploiting virtual coordinates for improved routing performance in sensor networks. IEEE Transactions on Mobile Computing 10(9), 1214–1226 (2011)

    Article  Google Scholar 

  12. Huang, P., Wang, C., Xiao, L.: Improving end-to-end routing performance of greedy forwarding in sensor networks. IEEE Transactions on Parallel and Distributed Systems 23(3), 556–563 (2012)

    Article  Google Scholar 

  13. Choi, H., Zhu, S., La Porta, T.F.: SET: Detecting node clones in sensor networks. In: Third International Conference on Security and Privacy in Communications Networks and the Workshops, SecureComm 2007. IEEE (2007)

    Google Scholar 

  14. Tsai, C.-H., Chang, K.-T., Tsai, C.-H., Wang, Y.-H.: A Routing Mechanism Using Virtual Coordination Anchor Node Apply to Wireless Sensor Networks. In: Park, J.J.(J.H.), Arabnia, H.R., Kim, C., Shi, W., Gil, J.-M. (eds.) GPC 2013. LNCS, vol. 7861, pp. 546–555. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  15. Xing, K., et al.: Real-time detection of clone attacks in wireless sensor networks. In: The 28th International Conference on Distributed Computing Systems, ICDCS 2008. IEEE (2008)

    Google Scholar 

  16. Conti, M., et al.: Distributed detection of clone attacks in wireless sensor networks. IEEE Transactions on Dependable and Secure Computing 8(5), 685–698 (2011)

    Article  Google Scholar 

  17. Li, Z., Gong, G.: On the node clone detection in wireless sensor networks. IEEE/ACM Transactions on Networking (TON) 21(6), 1799–1811 (2013)

    Article  MathSciNet  Google Scholar 

  18. Bahr, M.: Proposed routing for IEEE 802.11 s WLAN mesh networks. In: Proceedings of the 2nd Annual International Workshop on Wireless Internet. ACM (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. Subhash .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Subhash, P., Ramachandram, S. (2015). Mitigating FRI-Attack Using Virtual Co-ordinate System in Multi-hop Wireless Mesh Networks. In: Satapathy, S., Govardhan, A., Raju, K., Mandal, J. (eds) Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Society of India CSI Volume 2. Advances in Intelligent Systems and Computing, vol 338. Springer, Cham. https://doi.org/10.1007/978-3-319-13731-5_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-13731-5_36

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-13730-8

  • Online ISBN: 978-3-319-13731-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics