One stone two birds: On the security and routing in Wireless Mesh Networks
- 1 April 2014
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 2486-2491
- https://doi.org/10.1109/wcnc.2014.6952779
Abstract
Wireless Mesh Networks (WMNs) have been a major research focus in the recent years leading to a profusion of protocol proposals. While most existing implementations address routing aspects, none of the proposals addressing security aspects have gained acceptance in practice, due to their high overhead or strong assumptions. To cope with security issues in current WMN deployments, well-known non-secure routing protocols such as HWMP, BATMAN or OLSR could be combined with the security frameworks of the IEEE802.11s or the IEEE802.11i standards. In this paper, we analyze the impact of both security frameworks on the performance of WMNs in simulation and in a real testbed. Besides, we experimentally show that both frameworks do not mitigate the blackhole and wormhole attacks. In addition, we demonstrate that an efficient secure routing protocol combined with a dynamic key management scheme are inevitable to establish reliable WMNs.Keywords
This publication has 21 references indexed in Scilit:
- Performance evaluation of PASER — An efficient secure route discovery approach for wireless mesh networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2012
- On Securing HWMP Using IBCPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2011
- Castor: Scalable Secure Routing for Ad Hoc NetworksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- WMNSecPublished by Association for Computing Machinery (ACM) ,2009
- A survey of routing attacks in mobile ad hoc networksIEEE Wireless Communications, 2007
- Authenticated routing for ad hoc networksIEEE Journal on Selected Areas in Communications, 2005
- Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc NetworksWireless Networks, 2005
- The advantages of elliptic curve cryptography for wireless securityIEEE Wireless Communications, 2004
- SEAD: secure efficient distance vector routing for mobile wireless ad hoc networksAd Hoc Networks, 2003
- Securing ad hoc routing protocolsPublished by Association for Computing Machinery (ACM) ,2002