Skip to main content

SEAODV: A Security Enhanced AODV Routing Protocol for Wireless Mesh Networks

  • Chapter

Part of the book series: Lecture Notes in Computer Science ((TCOMPUTATSCIE,volume 6480))

Abstract

In this paper, we propose a Security Enhanced AODV routing protocol (SEAODV) for wireless mesh networks (WMN). SEAODV employs Blom’s key pre-distribution scheme to compute the pairwise transient key (PTK) through the flooding of enhanced HELLO message and subsequently uses the established PTK to distribute the group transient key (GTK). PTK and GTK authenticate unicast and broadcast routing messages respectively. In WMN, a unique PTK is shared by each pair of nodes, while GTK is shared secretly between the node and all its one-hop neighbours. A message authentication code (MAC) is attached as the extension to the original AODV routing message to guarantee the message’s authenticity and integrity in a hop-by-hop fashion. Security analysis and performance evaluation show that SEAODV is more effective in preventing identified routing attacks and outperforms ARAN and SAODV in terms of computation cost and route acquisition latency.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sichitiu, M.L.: Wireless mesh networks: opportunities and challenges. In: Proceedings of the Wireless World Congress (2005)

    Google Scholar 

  2. Akyildiz, I.F., Wang, X., Wang, W.: Wireless mesh networks: A survey. Computer Networks (2005)

    Google Scholar 

  3. Bruno, R., Conti, M., Gregori, E.: Mesh networks: Commodity multihop ad hoc networks. IEEE Communications Magazine 43, 63–71 (2005)

    Article  Google Scholar 

  4. Zapata, M., Asokan, N.: Securing ad-hoc routing protocols. In: Proceedings of ACM Workshop on Wireless Security (WiSe) (2002)

    Google Scholar 

  5. Perkins, C.E., Belding Royer, E., Das, S.R.: Ad hoc on-demand distance vector routing. In: IETF RFC 3561 (2003)

    Google Scholar 

  6. Sangiri, K., Dahil, B.: A Secure Routing Protocol for Ad Hoc Networks. In: Proceedings of 10th IEEE International Conference on Network Protocols (2002)

    Google Scholar 

  7. Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne, A Secure On-Demand Routing Protocol for Ad Hoc Networks. In: Proceedings of MobiCom, Atlanta, GA (2002)

    Google Scholar 

  8. Perrig, A., Canetti, R., Tygar, J.D., Song, D.: Efficient authentication and signing of multicast streams over lossy channels. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 56–73 (2000)

    Google Scholar 

  9. Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. ACM, New York (2003)

    Google Scholar 

  10. IEEE 802.11s Task Group. Draft Amendment to Standard for Information Technology Telecommunications and Information Exchange Between Systems – LAN/MAN Specific Requirements – Part 4: Wireless Medium Access Control (MAC) and physical layer (PHY) specifications: Amendment: ESS Mesh Networking. IEEE 802.11s/D1.06 (2007)

    Google Scholar 

  11. Bahr, M.: Proposed Routing for IEEE 802.11s WLAN Mesh Networks. In: 2nd Annual International Wireless Internet Conference (WICON), Boston, MA, USA (2006)

    Google Scholar 

  12. Bahr, M.: Update on the Hybrid Wireless Mesh protocol of 802.11s. In: Proceedings of IEEE International Conference on Mobile Adhoc and Sensor Systems, MASS, pp. 1–6 (2007)

    Google Scholar 

  13. Zhu, S., Xu, S., Setia, S., Jajodia, S.: LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks. In: ICDCS International Workshop on Mobile and Wireless Network, Providence, Rodhe Island (2003)

    Google Scholar 

  14. Jing, X., Lee, M.J.: Energy-Aware Algorithms for AODV in Ad Hoc Networks. In: Proceedings of Mobile Computing and Ubiquitous Networking, Yokosuka, Japan (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Li, C., Wang, Z., Yang, C. (2010). SEAODV: A Security Enhanced AODV Routing Protocol for Wireless Mesh Networks. In: Gavrilova, M.L., Tan, C.J.K., Moreno, E.D. (eds) Transactions on Computational Science XI. Lecture Notes in Computer Science, vol 6480. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17697-5_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17697-5_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17696-8

  • Online ISBN: 978-3-642-17697-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics