全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
Sensors  2013 

A Security Analysis of the 802.11s Wireless Mesh Network Routing Protocol and Its Secure Routing Protocols

DOI: 10.3390/s130911553

Keywords: hybrid wireless mesh protocol, secure routing, wireless mesh network, 802.11s, sensor network

Full-Text   Cite this paper   Add to My Lib

Abstract:

Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.

References

[1]  Akyildiz, F.I.; Wang, X.; Wang, W. Wireless mesh networks: A survey. Comput. Netw. ISDN Syst. 2005, 47, 445–487.
[2]  Varshney, U. Pervasive healthcare and wireless heath monitoring. Mob. Netw. Appl. 2007, 12, 113–127.
[3]  802.11 Working Group of the IEEE 802 Committee. IEEE P802.11s/D4.01 Draft Standard; IEEE: Washington, DC, USA, 2010.
[4]  GainSpan White Paper–Capitalizing on 802.11 for Sensor Networks, Available online: http://www.gainspan.com/docs2/GS_80211_networks-WP.pdf (accessed on 28 January 2013).
[5]  Bouckaert, S.; Poorter, E.D.; Mil, P.D.; Moerman, I.; Demeester, P. Interconnecting Wireless Sensor and Wireless Mesh Networks: Challenges and Strategies. Proceedings of 2009 IEEE GLOBECOM, Honolulu, HI, USA, 30 November–4 December 2009; pp. 12–23.
[6]  Lee, J.S.; Su, Y.W.; Shen, C.C. A Comparative Study of Wireless Protocols: Bluetooth, UWB, ZigBee, and Wi-Fi. Proceedings of the 33rd Annual Conference of the IEEE Industrial Electronics Society (IECON), Taipei, Taiwan, 5–8 November 2007.
[7]  Wang, X.; Lim, A.O. IEEE 802.11s Wireless mesh networks: Framework and challenges. Ad Hoc Netw. 2008, 6, 970–984.
[8]  802.11 Working Group of the IEEE 802 Committee. IEEE P802.11w; IEEE: Washington, DC, USA, 2009.
[9]  Zapata, M.G.; Mobile Ad Hoc Networking Working Group INTERNET DRAFT. Secure Ad Hoc On-Demand Distance Vector (SAODV) Routing draft-guerrero-manet-saodv-06.txt. Available online: http://people.ac.upc.edu/guerrero/papers/draft-guerrero-manet-saodv-06.txt (accessed on 28 January2013).
[10]  Islam, M.S.; Hamid, M.A.; Hong, C.S. SHWMP: A secure hybrid wireless mesh protocol for IEEE 802.11s wireless mesh network. Trans. Comput. Sci. 2009, 6, 95–114.
[11]  Sanzgiri, K.; LaFlamme, D.; Dahill, B.; Levine, B.N.; Shields, C.; Belding-Royer, E.M. Authenticated routing for ad hoc networks. IEEE J. Selected Areas Commun. 2005, 23, 598–610.
[12]  Hu, Y.C.; Perrig, A.; Johnson, D.B. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Network. Proceedings of the 8th Ann Int'l Conference on Mobile Computing and Networking, Atlanta, Georgia, USA, 23–26 September 2002; pp. 12–23.
[13]  Park, Y.H.; Song, H.J.; Lee, K.K.; Kim, C.S.; Lee, S.G.; Moon, S.J. Secure route discovery protocol for ad hoc networks. IEICE Trans. Fundament. 2007, E90-A, 539–541.
[14]  Anjum, F.; Mouchtaris, P. Chapter 4 Secure Routing. In Security for Wireless Ad Hoc Networks; John Wiley & Sons: Somerset, NJ, USA, 2007; pp. 69–119.
[15]  Ning, P.; Sun, K. How to misuse AODV: A Case Study of Insider Attacks against Mobile Ad-Hoc Routing Protocols. Proceedings of the 2003 IEEE Workshop on Information Assurance, West Point, NY, USA, 18–20 June 2003.
[16]  Ben-Othman, J.; Benitez, Y.I.S. IBC-HWMP: A novel secure identity-based cryptography-based scheme for hybrid wireless mesh protocol for IEEE 802.11s. Concurr. Comput. Pract. Exper. 2011, doi:10.1002/cpe.1813.
[17]  Yi, P.; Wu, Y.; Zou, F.; Liu, N. A survey on security in wireless mesh networks. IETE Tech. Rev. 2010, 27, 6–14.
[18]  Zhang, W.; Wang, Z.; Das, S.K.; Hassan, M. Security Issues in Wireless Mesh Networks. In Wireless Mesh Networks: Architectures and Protocols; Hossain, E., Leung, K.K., Eds.; Springer: New York, NY, USA, 2008; pp. 309–330.
[19]  802.11 Working Group of the IEEE 802 Committee. IEEE P802.11i; IEEE: Washington, DC, USA, 2004.
[20]  Ben-othman, J.; Benitez, Y.I.S. A Light Weight Security Scheme for HWMP Protocol Using Elliptic Curve Technique. Proceedings of the 11th IEEE International Workshop on Wireless Local Networks, Bonn, Germany, 4–7 October 2011; pp. 850–854.
[21]  Ben-Othman, J.; Claude, J.; Benitez, Y.I.S. A Novel Mechanism to Secure Internal Attacks in HWMP Routing Protocol. Proceedings of IEEE International Conference on of Communications, Ottawa, Canada, 10–15 June 2012; pp. 162–166.
[22]  Yang, Y.; Wang, J.; Kravets, R. Designing Routing Metrics for Mesh Networks. Proceedings of IEEE Workshop on Wireless Mesh Networks–WiMesh, Santa Clara, CA, USA, 26 September 2005.
[23]  Bahr, M. Update on the Hybrid Wireless Mesh Protocol of IEEE 802.11s. Proceedings of 2007 IEEE Internatonal Conference on Mobile Ad Hoc and Sensor Systems, Pisa, Italy, 8–11 October 2007.
[24]  HART Communication Foundation. WirelessHART Technical Data Sheet, HCF_LIT-89. Revision 1.0B. Available Online: http://www.scribd.com/doc/57357058/Wireless-Hart-Datasheet (accessed on 28 January 2013).
[25]  Ghannay, S.; Gammar, S.M.; Felali, F.; Kamoun, F. Multi-Radio Multi-Channel Routing Metrics in IEEE 802.11s-Based Wireless Mesh Networks–And the Winner is …. Proceedings of IEEE First International Conference on Communications and Networking, Hammamet, Tunisia, 3–6 November 2009.
[26]  Kim, J.S.; Kim, K.J.; Park, J.Y.; Shon, T.S. A scalable and privacy-preserving child-care and safety service in a ubiquitous computing environment. Math. Comput. Model. 2011, 55, 45–57.
[27]  Jaitner, T.; Gawin, W. A mobile measure device for the analysis of highly dynamic movement techniques. Proced. Eng. 2010, 2, 3005–3010.
[28]  Iera, A.; Molinaro, A.; Paratore, S.Y.; Ruggeri, G.; Zurzolo, A. Making a mesh router/gateway from a smartphone: Is that a practical solution? Ad Hoc Netw. 2011, 9, 1414–1429.
[29]  Khan, S.; Mast, N.; Loo, K.K.; Salahuddin, A. Passive Security Threats and Consequences in IEEE 802.11 Wireless Mesh Networks. Int. J. Dig. Cont. Tech. Appl. 2008, 2, 4–8.
[30]  Al-Shurman, M.; Yoo, S.M.; Park, S. Black Hole Attack in Wireless Ad Hoc Networks. Proceedings of ACM 42nd Southeast Conference, Huntsville, AL, USA, 2–3 April 2004.
[31]  Maan, F.; Abbas, Y.; Mazhar, N. Vulnerability Assessment of AODV and SAODV Routing Protocols Against Network Routing Attacks and Performance Comparisons. Proceedings of 2011 IEEE Conference on Wireless Advanced (WiAd), London, England, 20–22 June 2011.
[32]  Naeem, T.; Loo, K.K. Common Security Issues and Challenges in Wireless Sensor Networks and IEEE 802.11 Wireless Mesh Networks. Int. J. Dig. Cont. Tech. Appl. 2009, 3, 88–93.
[33]  Lin, H.; Ma, J.; Hu, J.; Yang, K. PA-SHWMP: A privacy-aware secure hybrid wireless mesh protocol for IEEE 802.11s wireless mesh networks. EURASIP J. Wirel. Commun. Netw. 2012, doi:10.1186/1687-1499-2012-69.
[34]  Mao, W. Modern Cryptography: Theory and Practice.; Prentice-Hall: Upper Saddle River, NJ, USA, 2004. Chapter 10.
[35]  Stalling, W. Cryptography and Network Security: Principle and Practice, 5th Edition ed.; Prentice Hall: Upper Saddle River, NJ, USA, 2010.
[36]  Mao, W. Modern Cryptography: Theory and Practice; Prentice-Hall: Upper Saddle River, NJ, USA, 2004. Chapter 11.
[37]  Certicom. An Elliptic Curve Cryptography (ECC) Primer, June 2014. Available online: http://www.certicom.com/images/pdfs/WP-ECCprimer.pdf (accessed on 12 August 2013).
[38]  Hass, F. Efficient identity based signature schemes based on pairings. Lect. Note. Comput. Sci. 2003, 2595, 310–324.
[39]  Hankerson, D.; Menezes, A.; Vanstone, S. Guide to Elliptic Curve Cryptography; Springer: New York, NY, USA, 2003.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133