Abstract
Wireless mesh networks (WMNs) support multimedia applications that claim for high level of security and performance simultaneously. However, wireless medium and multihop communication allow the action of attackers that can violate data packets or compromise the routing service, reducing performance and quality of service (QoS) of applications. Even in normal conditions of the network, without the presence of attackers, interferences in the shared wireless medium reduce the overall performance of paths. Such aspects require the development of new routing management approaches to address security and performance together. In this work, we integrate a path selection scheme, called CRoss-layer and Adaptive path selection scheme for Balancing performance and security on WMN data routing (CRAB), in the routing service to improve performance and security of multimedia applications, even in face of attacks. Novel results from scenarios under different data traffic patterns representative from multimedia applications show that the CRAB scheme yields a better tradeoff between network performance and security, even when the network is under routing attacks.
Similar content being viewed by others
References
Akyildiz, I., Wang, X.: A survey on wireless mesh networks. IEEE Commun. Mag. 43(9), 23–30 (2005)
Akyildiz, I., Wang, X.: Cross-layer design in wireless mesh networks. IEEE Trans. Veh. Technol. 57(2), 1061–1076 (2008)
Arce, I.: The weakest link revisited. IEEE Secur. Priv. 1(2), 72–76 (2003)
Athreya, A., Tague, P.: Towards secure multi-path routing for wireless mobile ad-hoc networks: a cross-layer strategy. IEEE Sens. Mesh Ad Hoc Commun. Netw. 146–148 (2011)
Benayoun, R., Roy, B., Sussman, N.: Manual de reference du programme electre. Note De Synthese et Formaton 25 (1966)
Bhandari, V., Vaidya, N.H.: Channel and interface management in a heterogeneous multi-channel multi-radio wireless network. Technical report, UIUC, Illinois, USA (2009)
Borges, V., Curado, M., Monteiro, E.: Cross-layer routing metrics for mesh networks: current status and research directions. Comput. Commun. 34(6), 681–703 (2011)
Camp, J., Robinson, J., Steger, C., Knightly, E.: Measurement driven deployment of a two-tier urban mesh access network. In: International Conference on Mobile Systems, Applications and Services, pp. 96–109 (2006)
Chakraborty, S., Yeh, C.H.: Comparative study of normalization procedures in multiattribute decision making. In: International Conference on Artificial Intelligence, Knowledge Engineering and Data, Bases, pp. 102–109 (2007)
Cheng, L., Das, S., Chen, C., Ma, J., Wang, W.: Robust forwarding for reactive routing protocols in wireless ad hoc networks with unreliable links. In: IEEE International Conference on Communications, pp. 1–6 (2011)
Couto, D.D., Aguayo, D., Bicket, J., Morris, R.: A high-throughput path metric for multi-hop wireless routing. In: ACM International Conference on Mobile Computing and Networking, pp. 134–146 (2003)
Dai, L., Xue, Y., Chang, B., Cao, Y., Cui, Y.: Integrating traffic estimation and routing optimization for multi-radio multi-channel wireless mesh networks. In: IEEE International Conference on Computer Communications, pp. 71–75 (2008)
Despotovic, Z., Aberer, K.: P2P reputation management: probabilistic estimation vs. social networks. Comput. Netw. 50(4), 485–500 (2006)
Draves, R., Padhye, J., Zill, B.: Routing in multi-radio, multi-hop wireless mesh networks. In: ACM International Conference on Mobile Computing and Networking, pp. 114–128 (2004)
Ellison, R., Fisher, D., Linger, R., Lipson, H., Longstaff, T., Mead, N.: Survivable network systems: an emerging discipline — CMU/SEI-97-TR-013. Carnegie Mellon University, Pittsburgh, PA, Technical report, Software Engineering Institute (1997)
Glass, S., Portmann, M., Muthukkumarasamy, V.: Securing wireless mesh networks. IEEE Internet Comput. 12(4), 30–36 (2008)
Guan, Q., Yu, R., Jiang, S., Leung, V.: Joint topology control and authentication design in mobile ad hoc networks with cooperative communications. IEEE Trans. Veh. Technol. 61(6), 2674–2685 (2012)
Guo, T., Cai, J., Foh, C.H., Zhang, Y.: Improving videophone transmission over multi-rate IEEE 802.11e networks. In: IEEE International Conference on Communications, pp. 3258–3262 (2008)
Heckerman, D., Mamdani, A., Wellman, M.P.: Real-world applications of Bayesian networks. Commun. ACM 38(3), 24–26 (1995)
Heegaard, P., Trivedi, K.: Network survivability modeling. Comput. Netw. 53, 1215–1234 (2009)
Incel, O., Dulman, S., Jansen, P., Mullender, S.: Multi-channel interference measurements for wireless sensor networks. In: IEEE Conference on Local, Computer Networks, pp. 694–701 (2006)
Jardosh, A., Ramachandran, K., Almeroth, K., Belding-Royer, E.: Understanding congestion in IEEE 802.11b wireless networks. In: Internet Measurement Conference, pp. 279–292 (2005)
Jeffreys, H.: Theory of Probability, 3rd edn. Clarendon, Oxford (1983)
Jeng, A.A.K., Jan, R.H., Li, C.Y., Chen, C.: Release-time-based multi-channel mac protocol for wireless mesh networks. Comput. Commun. 55(3), 2176–2195 (2012)
Khan, S., Alrajeh, N., Loo, K.K.: Secure route selection in wireless mesh networks. Comput. Netw. 56(2), 491–503 (2012)
Li, F., Bucciol, P., Vandoni, L., Fragoulis, N., Zanoli, S., Leschiutta, L., Lzaro, O.: Broadband internet access via multi-hop wireless mesh networks: design, protocol and experiments. Wirel. Pers. Commun. 58(4), 807–829 (2011)
Lin, X., Rasool, S.: Distributed and provably efficient algorithms for joint channel-assignment, scheduling, and routing in multichannel ad hoc wireless networks. IEEE/ACM Trans. Netw. 17(6), 1874–1887 (2009)
Liu, P., Tao, Z., Lin, Z., Erkip, E., Panwar, S.: Cooperative wireless communications: a cross-layer approach. IEEE Wirel. Commun. 13(4), 84–92 (2006)
Lou, W., Liu, W., Zhang, Y.: Performance optimization using multipath routing in mobile ad hoc and wireless sensor networks. Comb. Optim. Commun. Netw. 18(1), 117–146 (2006)
Mahmoud, M.E., Shen, X.: An integrated stimulation and punishment mechanism for thwarting packet dropping attack in multihop wireless networks. IEEE Trans. Veh. Technol. 60(8), 3947–3962 (2011)
Malakooti, B., Thomas, I., K.Tanguturi, S., Gajurel, S., Kim, H., Bhasin, K.: Multiple criteria network routing with simulation results. Industrial Engineering Research Conference (2006)
Mathur, S., Reznik, A., Ye, C., Mukherjee, R., Rahman, A., Shah, Y., Trappe, W., Mandayam, N.: Exploiting the physical layer for enhanced security. Wirel. Commun. 17, 63–70 (2010)
Matrawy, A., Lambadaris, L., Huang, C.: MPEG4 traffic modeling using the transform expand sample methodology. In: IEEE International Workshop on Networked Appliances, pp. 249–256 (2002)
Nogueira, M., Silva, H., Santos, A., Pujolle, G.: A security management architecture for supporting routing services on WANETs. IEEE Trans. Netw. Serv. Manag. 9(2), 156–168 (2012)
Nosratinia, A., Hunter, T., Hedayat, A.: Cooperative communication in wireless networks. IEEE Commun. Mag. 42(10), 74–80 (2004)
Oliveira, T., Mahadevan, S., Agrawal, D.: Handling network uncertainty in heterogeneous wireless networks. In: IEEE INFOCOM, pp. 2390–2398 (2011)
Paris, S., Nita-Rotaru, C., Martignon, F., Capone, A.: EFW: A cross-layer metric for reliable routing in wireless mesh networks with selfish participants. In: IEEE International Conference on Computer Communications, pp. 576–580 (2011)
Perron, E., Diggavi, S., Telatar, E.: On cooperative wireless network secrecy. In: IEEE International Conference on Computer Communications, pp. 1935–1943 (2009)
Pirzada, A., McDonald, C.: Trust establishment in pure ad-hoc networks. Wirel. Pers. Commun. 37(1–2), 139–168 (2006)
Royer, E., Melliar-Smithy, P., Moser, L.: An analysis of the optimum node density for ad hoc mobile networks. In: IEEE International Conference on Communications, pp. 857–861 (2001)
Saaty, T.: The Analytic Hierarchy Process. McGraw Hill, New York (1980)
Seth, S., Gankotiya, A.: Denial of service attacks and detection methods in wireless mesh networks. In: International Test Conference, pp. 238–240 (2010)
Shabdanov, S., Mitran, P., Rosenberg, C.: Cross-layer optimization using advanced physical layer techniques in wireless mesh networks. IEEE Trans. Wirel. Commun. 11(4), 1622–1631 (2012)
Shihab, E., Cai, L., Wan, F., Gulliver, A., Tin, N.: Wireless mesh networks for in-home IPTV distribution. IEEE Netw. 22(1), 52–57 (2008)
Shila, D.M., Cheng, Y., Anjali, T.: Capacity of cooperative wireless networks using multiple channels. In: IEEE International Conference on Communications, pp. 1–5 (2010)
Silva, H., Lima, M., Filho, R., Santos, A.: A cross-layer and adaptive scheme for balancing performance and security on WMN data routing. In: IEEE Global Communications Conference, pp. 1–5 (2010)
Ulukus, S., Ekrem, E.: Cooperative secrecy in wireless communications. In: Liu, R., Trappe, W. (eds.) Securing Wireless Communications at the Physical Layer, pp. 143–172. Springer, US (2010)
Wang, Z., Chen, Y., Li, C.: CORMAN: A novel cooperative opportunistic routing scheme in mobile ad hoc networks. IEEE J. Sel. Areas Commun. 30(2), 289–296 (2012)
Wang, Z., Crowcroft, J.: Quality-of-service routing for supporting multimedia applications. IEEE J. 0 Sel. Areas Commun. 14(7), 1228–1234 (1996)
Xing, K., Srinivasan, S., Rivera, J., Li, J., Cheng, X.: Attacks and countermeasures in sensor networks: a survey. In. Network Security, pp. 251–272 (2005)
Yang, S., Yeo, C.K., Lee, B.S.: Toward reliable data delivery for highly dynamic mobile ad hoc networks. IEEE Trans. Mob. Comput. 1(1), 111–124 (2012)
Yi, P., Tong, T., Liu, N., Wu, Y., Ma, J.: Security in wireless mesh networks: challenges and solutions. In: International Conference on Information Technology: New, Generations, pp. 423–428 (2009)
Zhang, Q., Zhang, Y.Q.: Cross-layer design for QoS support in multihop wireless networks. Proc. IEEE 96(1), 64–76 (2008)
Zhang, Y., Liu, W., Lou, W., Fang, Y.: Securing mobile ad hoc networks with certificateless public keys. IEEE Trans. Dependable Secur. Comput. 3(4), 386–399 (2006)
Zhao, Z., Hu, H., Ahn, G.J., Wu, R.: Risk-aware mitigation for MANET routing attacks. IEEE Trans. Dependable Secur. Comput. 9(2), 250–260 (2012)
Zhaoa, J., Hassaneina, H., Wub, J., Gub, G.: End-to-end QoS routing framework for differentiated services networks. Comput. Commun. 26(6), 566–578 (2003)
Acknowledgments
This work was supported by FUNCAP/Brazil, Grant 3180-08.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Silva, H., Santos, A. & Nogueira, M. Routing management for performance and security tradeoff in wireless mesh networks. Int. J. Inf. Secur. 14, 35–46 (2015). https://doi.org/10.1007/s10207-014-0246-9
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10207-014-0246-9