A Secure and Reliable Routing Protocol for Wireless Mesh Networks

被引:0
|
作者
黄仁俊 [1 ]
萧宇凯 [1 ]
机构
[1] Department of Computer Science and Information Engineering, Tamkang University
关键词
asymmetric link; wireless mesh networks; secure routing;
D O I
暂无
中图分类号
TN915.04 [通信规程、通信协议];
学科分类号
0810 ; 081001 ;
摘要
This study proposes an efficient secure routing protocol which considers symmetric and asymmetric links for wireless mesh networks(WMNs). A wireless mesh network is a group of wireless mesh routers and several kinds of wireless devices(or nodes). Individual node cooperates by forwarding packets to each other,allowing nodes to communicate beyond the symmetric or asymmetric links. Asymmetric link is a special feature of WMNs because the wireless transmission ranges of different wireless devices may be different. The asymmetric link enhances WMN coverage. Providing security in WMNs has become an important issue over the last few years. Existing research on this topic tends to focus on providing security for routing and data content in the symmetric link. However, most studies overlook the asymmetric link in these networks. This study proposes a novel distributed routing protocol beyond symmetric and asymmetric links, to guarantee the security and high reliability of the established route in a hostile environment, such as WMNs, by avoiding the use of unreliable intermediate nodes. The routes generated by the proposed protocol are shorter than those in prior works. The major objective of the proposed protocol is to allow trustworthy intermediate nodes to participate in the path construction protocol. The mesh clients out of mesh router wireless transmission range may discover a secure route to securely connect to the mesh router for Internet access via the proposed protocol. The proposed protocol enhances wireless mesh network coverage and assures security.
引用
收藏
页码:466 / 475
页数:10
相关论文
共 50 条
  • [11] A Secure Routing Scheme for Wireless Mesh Networks
    Nanda, Ashish
    Nanda, Priyadarsi
    He, Xiangjian
    Jamdagni, Aruna
    [J]. INFORMATION SYSTEMS SECURITY, 2016, 10063 : 393 - 408
  • [12] A SCALABLE ROUTING PROTOCOL FOR WIRELESS MESH NETWORKS
    Kocaoglu, Ramazan
    Akcayol, M. Ali
    [J]. JOURNAL OF THE FACULTY OF ENGINEERING AND ARCHITECTURE OF GAZI UNIVERSITY, 2012, 27 (04): : 891 - 899
  • [13] A Role Based Privacy-Aware Secure Routing Protocol for Wireless Mesh Networks
    Lin, Hui
    Hu, Jia
    Ma, Jianfeng
    Xu, Li
    Nagar, Atulya
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2014, 75 (03) : 1611 - 1633
  • [14] SRPM: Secure Routing Protocol for IEEE 802.11 Infrastructure Based Wireless Mesh Networks
    Khan, Shafiullah
    Loo, Kok-Keong
    Mast, Noor
    Naeem, Tahir
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2010, 18 (02) : 190 - 209
  • [15] A Multipath Routing Protocol in Wireless Mesh Networks
    Shu Yongan
    Shu Ziyu
    Luo Bin
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2012, 21 (01) : 131 - 136
  • [16] SRPM: Secure Routing Protocol for IEEE 802.11 Infrastructure Based Wireless Mesh Networks
    Shafiullah Khan
    Kok-Keong Loo
    Noor Mast
    Tahir Naeem
    [J]. Journal of Network and Systems Management, 2010, 18 : 190 - 209
  • [17] A hybrid routing protocol for wireless mesh networks
    Oh, Minseok
    [J]. 2008 IEEE INTERNATIONAL SYMPOSIUM ON BROADBAND MULTIMEDIA SYSTEMS AND BROADCASTING, 2008, : 277 - 281
  • [18] A Role Based Privacy-Aware Secure Routing Protocol for Wireless Mesh Networks
    Hui Lin
    Jia Hu
    Jianfeng Ma
    Li Xu
    Atulya Nagar
    [J]. Wireless Personal Communications, 2014, 75 : 1611 - 1633
  • [19] Secure routing protocol based on dynamic reputation and load balancing in wireless mesh networks
    Yuan, Xiaogang
    Chen, Yipiao
    [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2022, 11 (01):
  • [20] A Secure Routing Protocol for Wireless Embedded Networks
    Liao, Cheng-Fu
    Lu, Yung-Feng
    Pang, Ai-Chun
    Kuo, Tei-Wei
    [J]. RTCSA 2008: 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND REAL-TIME COMPUTING SYSTEMS AND APPLICATIONS - PROCEEDINGS, 2008, : 421 - 426