Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

Routing management for performance and security tradeoff in wireless mesh networks

  • Regular contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

Wireless mesh networks (WMNs) support multimedia applications that claim for high level of security and performance simultaneously. However, wireless medium and multihop communication allow the action of attackers that can violate data packets or compromise the routing service, reducing performance and quality of service (QoS) of applications. Even in normal conditions of the network, without the presence of attackers, interferences in the shared wireless medium reduce the overall performance of paths. Such aspects require the development of new routing management approaches to address security and performance together. In this work, we integrate a path selection scheme, called CRoss-layer and Adaptive path selection scheme for Balancing performance and security on WMN data routing (CRAB), in the routing service to improve performance and security of multimedia applications, even in face of attacks. Novel results from scenarios under different data traffic patterns representative from multimedia applications show that the CRAB scheme yields a better tradeoff between network performance and security, even when the network is under routing attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Akyildiz, I., Wang, X.: A survey on wireless mesh networks. IEEE Commun. Mag. 43(9), 23–30 (2005)

    Article  Google Scholar 

  2. Akyildiz, I., Wang, X.: Cross-layer design in wireless mesh networks. IEEE Trans. Veh. Technol. 57(2), 1061–1076 (2008)

    Article  Google Scholar 

  3. Arce, I.: The weakest link revisited. IEEE Secur. Priv. 1(2), 72–76 (2003)

    Article  Google Scholar 

  4. Athreya, A., Tague, P.: Towards secure multi-path routing for wireless mobile ad-hoc networks: a cross-layer strategy. IEEE Sens. Mesh Ad Hoc Commun. Netw. 146–148 (2011)

  5. Benayoun, R., Roy, B., Sussman, N.: Manual de reference du programme electre. Note De Synthese et Formaton 25 (1966)

  6. Bhandari, V., Vaidya, N.H.: Channel and interface management in a heterogeneous multi-channel multi-radio wireless network. Technical report, UIUC, Illinois, USA (2009)

  7. Borges, V., Curado, M., Monteiro, E.: Cross-layer routing metrics for mesh networks: current status and research directions. Comput. Commun. 34(6), 681–703 (2011)

    Article  Google Scholar 

  8. Camp, J., Robinson, J., Steger, C., Knightly, E.: Measurement driven deployment of a two-tier urban mesh access network. In: International Conference on Mobile Systems, Applications and Services, pp. 96–109 (2006)

  9. Chakraborty, S., Yeh, C.H.: Comparative study of normalization procedures in multiattribute decision making. In: International Conference on Artificial Intelligence, Knowledge Engineering and Data, Bases, pp. 102–109 (2007)

  10. Cheng, L., Das, S., Chen, C., Ma, J., Wang, W.: Robust forwarding for reactive routing protocols in wireless ad hoc networks with unreliable links. In: IEEE International Conference on Communications, pp. 1–6 (2011)

  11. Couto, D.D., Aguayo, D., Bicket, J., Morris, R.: A high-throughput path metric for multi-hop wireless routing. In: ACM International Conference on Mobile Computing and Networking, pp. 134–146 (2003)

  12. Dai, L., Xue, Y., Chang, B., Cao, Y., Cui, Y.: Integrating traffic estimation and routing optimization for multi-radio multi-channel wireless mesh networks. In: IEEE International Conference on Computer Communications, pp. 71–75 (2008)

  13. Despotovic, Z., Aberer, K.: P2P reputation management: probabilistic estimation vs. social networks. Comput. Netw. 50(4), 485–500 (2006)

    Article  MATH  Google Scholar 

  14. Draves, R., Padhye, J., Zill, B.: Routing in multi-radio, multi-hop wireless mesh networks. In: ACM International Conference on Mobile Computing and Networking, pp. 114–128 (2004)

  15. Ellison, R., Fisher, D., Linger, R., Lipson, H., Longstaff, T., Mead, N.: Survivable network systems: an emerging discipline — CMU/SEI-97-TR-013. Carnegie Mellon University, Pittsburgh, PA, Technical report, Software Engineering Institute (1997)

  16. Glass, S., Portmann, M., Muthukkumarasamy, V.: Securing wireless mesh networks. IEEE Internet Comput. 12(4), 30–36 (2008)

    Article  Google Scholar 

  17. Guan, Q., Yu, R., Jiang, S., Leung, V.: Joint topology control and authentication design in mobile ad hoc networks with cooperative communications. IEEE Trans. Veh. Technol. 61(6), 2674–2685 (2012)

  18. Guo, T., Cai, J., Foh, C.H., Zhang, Y.: Improving videophone transmission over multi-rate IEEE 802.11e networks. In: IEEE International Conference on Communications, pp. 3258–3262 (2008)

  19. Heckerman, D., Mamdani, A., Wellman, M.P.: Real-world applications of Bayesian networks. Commun. ACM 38(3), 24–26 (1995)

    Article  Google Scholar 

  20. Heegaard, P., Trivedi, K.: Network survivability modeling. Comput. Netw. 53, 1215–1234 (2009)

    Article  MATH  Google Scholar 

  21. Incel, O., Dulman, S., Jansen, P., Mullender, S.: Multi-channel interference measurements for wireless sensor networks. In: IEEE Conference on Local, Computer Networks, pp. 694–701 (2006)

  22. Jardosh, A., Ramachandran, K., Almeroth, K., Belding-Royer, E.: Understanding congestion in IEEE 802.11b wireless networks. In: Internet Measurement Conference, pp. 279–292 (2005)

  23. Jeffreys, H.: Theory of Probability, 3rd edn. Clarendon, Oxford (1983)

    MATH  Google Scholar 

  24. Jeng, A.A.K., Jan, R.H., Li, C.Y., Chen, C.: Release-time-based multi-channel mac protocol for wireless mesh networks. Comput. Commun. 55(3), 2176–2195 (2012)

    Google Scholar 

  25. Khan, S., Alrajeh, N., Loo, K.K.: Secure route selection in wireless mesh networks. Comput. Netw. 56(2), 491–503 (2012)

    Article  Google Scholar 

  26. Li, F., Bucciol, P., Vandoni, L., Fragoulis, N., Zanoli, S., Leschiutta, L., Lzaro, O.: Broadband internet access via multi-hop wireless mesh networks: design, protocol and experiments. Wirel. Pers. Commun. 58(4), 807–829 (2011)

    Article  Google Scholar 

  27. Lin, X., Rasool, S.: Distributed and provably efficient algorithms for joint channel-assignment, scheduling, and routing in multichannel ad hoc wireless networks. IEEE/ACM Trans. Netw. 17(6), 1874–1887 (2009)

    Article  Google Scholar 

  28. Liu, P., Tao, Z., Lin, Z., Erkip, E., Panwar, S.: Cooperative wireless communications: a cross-layer approach. IEEE Wirel. Commun. 13(4), 84–92 (2006)

    Article  Google Scholar 

  29. Lou, W., Liu, W., Zhang, Y.: Performance optimization using multipath routing in mobile ad hoc and wireless sensor networks. Comb. Optim. Commun. Netw. 18(1), 117–146 (2006)

    MathSciNet  Google Scholar 

  30. Mahmoud, M.E., Shen, X.: An integrated stimulation and punishment mechanism for thwarting packet dropping attack in multihop wireless networks. IEEE Trans. Veh. Technol. 60(8), 3947–3962 (2011)

    Article  Google Scholar 

  31. Malakooti, B., Thomas, I., K.Tanguturi, S., Gajurel, S., Kim, H., Bhasin, K.: Multiple criteria network routing with simulation results. Industrial Engineering Research Conference (2006)

  32. Mathur, S., Reznik, A., Ye, C., Mukherjee, R., Rahman, A., Shah, Y., Trappe, W., Mandayam, N.: Exploiting the physical layer for enhanced security. Wirel. Commun. 17, 63–70 (2010)

    Article  Google Scholar 

  33. Matrawy, A., Lambadaris, L., Huang, C.: MPEG4 traffic modeling using the transform expand sample methodology. In: IEEE International Workshop on Networked Appliances, pp. 249–256 (2002)

  34. Nogueira, M., Silva, H., Santos, A., Pujolle, G.: A security management architecture for supporting routing services on WANETs. IEEE Trans. Netw. Serv. Manag. 9(2), 156–168 (2012)

    Article  Google Scholar 

  35. Nosratinia, A., Hunter, T., Hedayat, A.: Cooperative communication in wireless networks. IEEE Commun. Mag. 42(10), 74–80 (2004)

    Article  Google Scholar 

  36. Oliveira, T., Mahadevan, S., Agrawal, D.: Handling network uncertainty in heterogeneous wireless networks. In: IEEE INFOCOM, pp. 2390–2398 (2011)

  37. Paris, S., Nita-Rotaru, C., Martignon, F., Capone, A.: EFW: A cross-layer metric for reliable routing in wireless mesh networks with selfish participants. In: IEEE International Conference on Computer Communications, pp. 576–580 (2011)

  38. Perron, E., Diggavi, S., Telatar, E.: On cooperative wireless network secrecy. In: IEEE International Conference on Computer Communications, pp. 1935–1943 (2009)

  39. Pirzada, A., McDonald, C.: Trust establishment in pure ad-hoc networks. Wirel. Pers. Commun. 37(1–2), 139–168 (2006)

    Article  Google Scholar 

  40. Royer, E., Melliar-Smithy, P., Moser, L.: An analysis of the optimum node density for ad hoc mobile networks. In: IEEE International Conference on Communications, pp. 857–861 (2001)

  41. Saaty, T.: The Analytic Hierarchy Process. McGraw Hill, New York (1980)

    MATH  Google Scholar 

  42. Seth, S., Gankotiya, A.: Denial of service attacks and detection methods in wireless mesh networks. In: International Test Conference, pp. 238–240 (2010)

  43. Shabdanov, S., Mitran, P., Rosenberg, C.: Cross-layer optimization using advanced physical layer techniques in wireless mesh networks. IEEE Trans. Wirel. Commun. 11(4), 1622–1631 (2012)

    Article  Google Scholar 

  44. Shihab, E., Cai, L., Wan, F., Gulliver, A., Tin, N.: Wireless mesh networks for in-home IPTV distribution. IEEE Netw. 22(1), 52–57 (2008)

    Article  Google Scholar 

  45. Shila, D.M., Cheng, Y., Anjali, T.: Capacity of cooperative wireless networks using multiple channels. In: IEEE International Conference on Communications, pp. 1–5 (2010)

  46. Silva, H., Lima, M., Filho, R., Santos, A.: A cross-layer and adaptive scheme for balancing performance and security on WMN data routing. In: IEEE Global Communications Conference, pp. 1–5 (2010)

  47. Ulukus, S., Ekrem, E.: Cooperative secrecy in wireless communications. In: Liu, R., Trappe, W. (eds.) Securing Wireless Communications at the Physical Layer, pp. 143–172. Springer, US (2010)

    Google Scholar 

  48. Wang, Z., Chen, Y., Li, C.: CORMAN: A novel cooperative opportunistic routing scheme in mobile ad hoc networks. IEEE J. Sel. Areas Commun. 30(2), 289–296 (2012)

    Article  Google Scholar 

  49. Wang, Z., Crowcroft, J.: Quality-of-service routing for supporting multimedia applications. IEEE J. 0 Sel. Areas Commun. 14(7), 1228–1234 (1996)

  50. Xing, K., Srinivasan, S., Rivera, J., Li, J., Cheng, X.: Attacks and countermeasures in sensor networks: a survey. In. Network Security, pp. 251–272 (2005)

  51. Yang, S., Yeo, C.K., Lee, B.S.: Toward reliable data delivery for highly dynamic mobile ad hoc networks. IEEE Trans. Mob. Comput. 1(1), 111–124 (2012)

    Article  Google Scholar 

  52. Yi, P., Tong, T., Liu, N., Wu, Y., Ma, J.: Security in wireless mesh networks: challenges and solutions. In: International Conference on Information Technology: New, Generations, pp. 423–428 (2009)

  53. Zhang, Q., Zhang, Y.Q.: Cross-layer design for QoS support in multihop wireless networks. Proc. IEEE 96(1), 64–76 (2008)

    Article  Google Scholar 

  54. Zhang, Y., Liu, W., Lou, W., Fang, Y.: Securing mobile ad hoc networks with certificateless public keys. IEEE Trans. Dependable Secur. Comput. 3(4), 386–399 (2006)

    Article  Google Scholar 

  55. Zhao, Z., Hu, H., Ahn, G.J., Wu, R.: Risk-aware mitigation for MANET routing attacks. IEEE Trans. Dependable Secur. Comput. 9(2), 250–260 (2012)

    Article  Google Scholar 

  56. Zhaoa, J., Hassaneina, H., Wub, J., Gub, G.: End-to-end QoS routing framework for differentiated services networks. Comput. Commun. 26(6), 566–578 (2003)

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported by FUNCAP/Brazil, Grant 3180-08.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michele Nogueira.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Silva, H., Santos, A. & Nogueira, M. Routing management for performance and security tradeoff in wireless mesh networks. Int. J. Inf. Secur. 14, 35–46 (2015). https://doi.org/10.1007/s10207-014-0246-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-014-0246-9

Keywords

Navigation