Skip to main content

On a Low Security Overhead Mechanism for Secure Multi-path Routing Protocol in Wireless Mesh Network

  • Conference paper
Managing Next Generation Networks and Services (APNOMS 2007)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4773))

Included in the following conference series:

Abstract

Secure multi-path routing is a critical issue in security management of WMNs due to its multi-hop nature as each node takes part in routing mechanism making it prone to routing attacks. Security management mechanisms are armed with features such as asymmetric cryptography which are costly in term of computations, transmissions and time delays. In this paper, we propose a security management mechanism for multi-path routing which efficiently uses the characteristics of WMNs, mutual authentication and secrete key cryptography to provide secure multi-path route management. Our management scheme takes less overhead than the available secure multi-path routing mechanisms. Simulation analyses and the performance of the mechanism are presented in support of the proposal.

“This paper was supported by ITRC and MIC”.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bruno, R., Conti, M., Gregori, E.: Mesh networks: commodity multihop ad hoc networks. IEEE Communications Magazine 43(3), 123–131 (2005)

    Article  Google Scholar 

  2. Akyildiz, I.F., Wang, X., Wang, W.: Wireless Mesh Network: A Survey. Computer Networks and ISDN Systems 47(4) (2005)

    Google Scholar 

  3. Garcia-Luna-Aceves, J.J., Mosko, M.: Multipath Routing in Wireless Mesh Networks. In: WiMesh 2005, Santa Clara, CA, September 26, 2005, IEEE Computer Society Press, Los Alamitos (2005)

    Google Scholar 

  4. Gupta, R., Chi, E., Walrand, J.: Different Algorithms for Normal and Protection Paths. Journal of Network and Systems Management archive 13(1), 13–33 (2005)

    Article  Google Scholar 

  5. Ganjali, Y., Keshavarzian, A.: Load Balancing in Ad hoc Networks: Single-path Routing vs. Multi-path Routing. In: proceedings of IEEE Annual Conference on Computer Communications (INFOCOM), pp. 1120–1125 (March 2004)

    Google Scholar 

  6. Papadimitratos, P., Haas, Z.J.: Secure Routing for Mobile Ad Hoc Networks. Mobile Computing and Communications Review 6(4) (2002)

    Google Scholar 

  7. Papadimitratos, P., Haas, Z.: Secure routing for mobile ad hoc networks. In: Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), TX, San Antonio (January 2002)

    Google Scholar 

  8. Burmester, M., van Le, T.: Secure multipath communication in mobile ad hoc networks. In: ITCC 2004, IEEE, Las Vegas (2004)

    Google Scholar 

  9. Weeks, M., Altun, G.: Efficient, Secure, Dynamic Source Routing for Ad-hoc Networks. Journal of Network and Systems Management 14(4), 559–581 (2006)

    Article  Google Scholar 

  10. Kotzanikolaou, P., Mavropodi, R., Douligeris, C.: Secure multipath routing for mobile ad hoc networks. In: Proceedings of the WONSS05 Conference, St. Moritz, Switzerland, January 19-21 2005, pp. 89–96. IEEE, Los Alamitos (2005)

    Google Scholar 

  11. Raghani, S., Toshniwal, D., Joshi, R.: Dynamic Support for Distributed Certification Authority in Mobile Ad Hoc Networks. In: ICHIT 2006, vol. 1, pp. 424–432 (November 2006)

    Google Scholar 

  12. Perkins, C.E.: Mobile networking through Mobile IP. IEEE Internet Computing 2(1), 58–69 (1998)

    Article  Google Scholar 

  13. Diffie, W., van Oorschot, P., Wiener, M.: Authentication and authenticated key exchange. Designs, Codes and Cryptography 2(2), 107–125 (1992)

    Article  MathSciNet  Google Scholar 

  14. Marina, M.K., Das, S.R.: On-demand multipath distance vector routing in ad hoc networks. In: the proceedings of Ninth International Conference on Network Protocols, November 11-14, 2001, pp. 14–23 (2001)

    Google Scholar 

  15. UCB/LBNL/VINT Network Simulator - ns 2, http://www.isi.edu/nsnamjns

Download references

Author information

Authors and Affiliations

Authors

Editor information

Shingo Ata Choong Seon Hong

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Siddiqui, M.S., Amin, S.O., Hong, C.S. (2007). On a Low Security Overhead Mechanism for Secure Multi-path Routing Protocol in Wireless Mesh Network. In: Ata, S., Hong, C.S. (eds) Managing Next Generation Networks and Services. APNOMS 2007. Lecture Notes in Computer Science, vol 4773. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-75476-3_47

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-75476-3_47

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-75475-6

  • Online ISBN: 978-3-540-75476-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics