Abstract
In this paper, we propose a Security Enhanced AODV routing protocol (SEAODV) for wireless mesh networks (WMN). SEAODV employs Blom’s key pre-distribution scheme to compute the pairwise transient key (PTK) through the flooding of enhanced HELLO message and subsequently uses the established PTK to distribute the group transient key (GTK). PTK and GTK authenticate unicast and broadcast routing messages respectively. In WMN, a unique PTK is shared by each pair of nodes, while GTK is shared secretly between the node and all its one-hop neighbours. A message authentication code (MAC) is attached as the extension to the original AODV routing message to guarantee the message’s authenticity and integrity in a hop-by-hop fashion. Security analysis and performance evaluation show that SEAODV is more effective in preventing identified routing attacks and outperforms ARAN and SAODV in terms of computation cost and route acquisition latency.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Sichitiu, M.L.: Wireless mesh networks: opportunities and challenges. In: Proceedings of the Wireless World Congress (2005)
Akyildiz, I.F., Wang, X., Wang, W.: Wireless mesh networks: A survey. Computer Networks (2005)
Bruno, R., Conti, M., Gregori, E.: Mesh networks: Commodity multihop ad hoc networks. IEEE Communications Magazine 43, 63–71 (2005)
Zapata, M., Asokan, N.: Securing ad-hoc routing protocols. In: Proceedings of ACM Workshop on Wireless Security (WiSe) (2002)
Perkins, C.E., Belding Royer, E., Das, S.R.: Ad hoc on-demand distance vector routing. In: IETF RFC 3561 (2003)
Sangiri, K., Dahil, B.: A Secure Routing Protocol for Ad Hoc Networks. In: Proceedings of 10th IEEE International Conference on Network Protocols (2002)
Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne, A Secure On-Demand Routing Protocol for Ad Hoc Networks. In: Proceedings of MobiCom, Atlanta, GA (2002)
Perrig, A., Canetti, R., Tygar, J.D., Song, D.: Efficient authentication and signing of multicast streams over lossy channels. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 56–73 (2000)
Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. ACM, New York (2003)
IEEE 802.11s Task Group. Draft Amendment to Standard for Information Technology Telecommunications and Information Exchange Between Systems – LAN/MAN Specific Requirements – Part 4: Wireless Medium Access Control (MAC) and physical layer (PHY) specifications: Amendment: ESS Mesh Networking. IEEE 802.11s/D1.06 (2007)
Bahr, M.: Proposed Routing for IEEE 802.11s WLAN Mesh Networks. In: 2nd Annual International Wireless Internet Conference (WICON), Boston, MA, USA (2006)
Bahr, M.: Update on the Hybrid Wireless Mesh protocol of 802.11s. In: Proceedings of IEEE International Conference on Mobile Adhoc and Sensor Systems, MASS, pp. 1–6 (2007)
Zhu, S., Xu, S., Setia, S., Jajodia, S.: LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks. In: ICDCS International Workshop on Mobile and Wireless Network, Providence, Rodhe Island (2003)
Jing, X., Lee, M.J.: Energy-Aware Algorithms for AODV in Ad Hoc Networks. In: Proceedings of Mobile Computing and Ubiquitous Networking, Yokosuka, Japan (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Li, C., Wang, Z., Yang, C. (2010). SEAODV: A Security Enhanced AODV Routing Protocol for Wireless Mesh Networks. In: Gavrilova, M.L., Tan, C.J.K., Moreno, E.D. (eds) Transactions on Computational Science XI. Lecture Notes in Computer Science, vol 6480. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17697-5_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-17697-5_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17696-8
Online ISBN: 978-3-642-17697-5
eBook Packages: Computer ScienceComputer Science (R0)