Abstract
Wireless Mesh Networks (WMNs) is a rapidly progressing area of research, promising future broadband anywhere and anytime network access. WMN is anticipated to resolve the limitations of Mobile Ad hoc Networks (MANET). Secure routing in WMN still remains as an open research problem due to its special characteristics such as dedicated backbone network with static/mobile mesh clients. This paper proposes a framework that addresses: i) the application of Identity Based Cryptography (IBC) to WMN, for efficient key management and for the distribution of pair-wise shared keys among the authenticated clients; and, ii) the design of a light weight secure routing protocol for intra-domain WMN routing which protects all the fields of the routing packet against various security attacks. Security analysis shows that the proposed protocol meets the targeted security goals. Performance analysis carried out using OPNET simulation studies show that the proposed protocol adds minimal delay and communication overhead to provide security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Akyildiz, I.F., Wang, X., Wang, W.: Wireless mesh networks: a survey Computer Networks 47, 445–487 (March 2005)
Waharte, S., Boutaba, R., Iraqi, Y., Ishibashi, B.: Routing Protocols in Wireless Mesh Networks: Challenges and Design Considerations Multimedia Tools and Applications (MTAP) journal. Special Issue on Advances in Consumer Communications and Networking 29(3), 285–303 (2006)
Shamir: Identity-based cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Boneh, D., Franklin, M.: Identity Based Encryption from the Weil Pairing. SIAM. J. of Computing 32, 586–615 (2003)
Boneh, D., Lynn, B., Shacham, H.: Short Signatures from the Weil Pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, Springer, Heidelberg (2001)
Dutta, R., Barua, R., Sarkar, P.: Pairing-Based Cryptographic Protocols: A Survey Cryptology ePrint Archive, Report (2004)
Belding-Royer, E.M., Das, S.: Ad hoc on-demand distance vector (AODV) routing RFC 3561, IETF (July 2003)
Zapata, M.: Secure Ad hoc On-Demand Distance Vector (SAODV) Routing Internet draft (November 2004)
Li, L., Chigan, C.: Token Routing: A Power Efficient Method for Securing AODV Routing Protocol. In: Proceedings of the 2006 IEEE International Conference on Networking, Sensing and Control, pp. 29–34 (2006)
Zhang, Y., Fang, Y.: ARSA: An Attack-Resilient Security architecture for Multihop Wireless Mash Networks. IEEE Journal on Selected areas in communications 24, 1916–1928 (2006)
Ning, P., Sun, K.: How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols. In: IEEE workshop on Information Assurance, pp. 60–67 (June 2003)
Sanzgiri, K., Dahill, B., Levine, B.N., Belding-Royer, E.M.: A secure routing protocol for ad hoc networks. In: ICNP 2002. Proceedings of the 10th IEEE International Conference on Network protocols (2002)
Reference manuals from, http://www.opnet.com
Jianliang Zheng, L., Young-Bae, M.J., Shrestha, K.: Emerging standards for wireless mesh technology. IEEE Wireless Communications 13, 56–65 (2006)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kandikattu, R., Jacob, L. (2007). A Secure Intra-domain Routing Protocol for Wireless Mesh Networks. In: McDaniel, P., Gupta, S.K. (eds) Information Systems Security. ICISS 2007. Lecture Notes in Computer Science, vol 4812. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77086-2_4
Download citation
DOI: https://doi.org/10.1007/978-3-540-77086-2_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-77085-5
Online ISBN: 978-3-540-77086-2
eBook Packages: Computer ScienceComputer Science (R0)