Browse > Article
http://dx.doi.org/10.3837/tiis.2019.07.004

Trust based Secure Reliable Route Discovery in Wireless Mesh Networks  

Navmani, TM (School of Computer Science and Engineering VIT Vellore)
Yogesh, P (Department of Information Science and Technology Anna University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.13, no.7, 2019 , pp. 3386-3411 More about this Journal
Abstract
Secured and reliable routing is a crucial factor for improving the performance of Wireless Mesh Networks (WMN) since these networks are susceptible to many types of attacks. The existing assumption about the internal nodes in wireless mesh networks is that they cooperate well during the forwarding of packets all the time. However, it is not always true due to the presence of malicious and mistrustful nodes. Hence, it is essential to establish a secure, reliable and stable route between a source node and a destination node in WMN. In this paper, a trust based secure routing algorithm is proposed for enhancing security and reliability of WMN, which contains cross layer and subject logic based reliable reputation scheme with security tag model for providing effective secured routing. This model uses only the trusted nodes with the forwarding reliability of data transmission and it isolates the malicious nodes from the providing path. Moreover, every node in this model is assigned with a security tag that is used for efficient authentication. Thus, by combining authentication, trust and subject logic, the proposed approach is capable of choosing the trusted nodes effectively to participate in forwarding the packets of trustful peer nodes successfully. The simulation results obtained from this work show that the proposed routing protocol provides optimal network performance in terms of security and packet delivery ratio.
Keywords
Wireless Mesh Networks; Trust Model; Reputation; Tag; Link Quality; Security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Mahmoud, M. M., Lin, X. and Shen, X. S. "Secure and reliable routing protocols for heterogeneous multihop wireless networks," IEEE Transactions on Parallel & Distributed Systems, vol. 26, no. 4, pp. 1140-1153, 2015.   DOI
2 Lin, H., Hu, J., Xu, L., Tian, Y., Liu, L. and Blakeway, S., "A trustworthy and energy-aware routing protocol in software-defined wireless mesh networks," Computers & Electrical Engineering, vol. 64, pp. 407-419, 2017.   DOI
3 Bhanu, M. S., "A Survey of Secure Routing Protocols for Wireless Mesh Networks," International Journal of Computer Applications, vol. 97, no. 6, 2014.
4 Zapata, M. G., & Asokan, N., "Securing ad hoc routing protocols," in Proc. of the 1st ACM workshop on Wireless security, ACM, pp. 1-10, September 2002.
5 Yi, S., Naldurg, P. and Kravets, R., "A security-aware routing protocol for wireless ad Hoc networks," Urbana, 51, 61801, 2002.
6 Khan, S., & Loo, J., "Cross layer secure and resource-aware on-demand routing protocol for hybrid wireless mesh networks," Wireless Personal Communications, vol.62, no. 1, pp. 201-214, 2012.   DOI
7 Azhari, S. V., Afshari, N. and Nassiri, M, "Novel lifetime routing metric for IEEE 802.11 wireless mesh networks," International Journal of Ad Hoc and Ubiquitous Computing, vol. 28, no. 1, pp. 1-12, 2018.   DOI
8 Nanda, A., Nanda, P., He, X., Jamdagni, A. and Puthal, D., "A hybrid encryption technique for Secure-GLOR: The adaptive secure routing protocol for dynamic wireless mesh networks," Future Generation Computer Systems, 2018.
9 Mahmoud, M. M., Taha, S., Misic, J. and Shen, X., "Lightweight privacy-preserving and secure communication protocol for hybrid ad hoc wireless networks," IEEE Transactions on Parallel & Distributed Systems, vol. 25, no. 8, pp. 2077-2090, 2014.   DOI
10 Yu, Y., Ning, Z. and Guo, L., "A secure routing scheme based on social network analysis in wireless mesh networks," Science China Information Sciences, vol. 59, 122310, 2016.   DOI
11 Siddiqui, M. S., Amin, S. O., Kim, J. H., & Hong, C. S., "MHRP: A secure multi-path hybrid routing protocol for wireless mesh network," in Proc. of Military Communications Conference, MILCOM 2007, IEEE, pp. 1-7, October 2007.
12 Khan, S., Loo, K. K., Mast, N. and Naeem, T, "SRPM: secure routing protocol for IEEE 802.11 infrastructure based wireless mesh networks," Journal of Network and Systems Management, vol. 18, no. 2, pp. 190-209, 2010.   DOI
13 Li, C., Wang, Z. and Yang, C., "Secure Routing for Wireless Mesh Networks," IJ Network Security, vol. 13, no. 2, pp.109-120, 2011.
14 Siddiqui, M. S., "Security issues in wireless mesh networks," in Proc. of International Conference on Multimedia and Ubiquitous Engineering, MUE'07, IEEE, pp. 717-722, April, 2007.
15 Bansal, D., Sofat, S., & Singh, G., "Secure routing protocol for hybrid wireless mesh Network (HWMN)," in Proc. of International Conference on Computer and Communication Technology (ICCCT), IEEE, pp. 837-843, 2010.
16 You, Z. and Wang, Y. "An efficient and secure routing protocol for a hybrid wireless mesh network," Journal of Computational Information Systems, vol. 8, no. 21, pp. 8693-8705, 2012.
17 Yu, M. and Leung, K. K., "A trustworthiness-based QoS routing protocol for wireless ad hoc Networks," IEEE Transactions on Wireless Communications, vol. 8, no. 4, pp. 1888-1898, 2009.   DOI
18 Konwar, S., Paul, A. B., Nandi, S. and Biswas, S., "MCDM based trust model for secure routing in Wireless Mesh Networks," in Proc. of Information and Communication Technologies (WICT), 2011 World Congress, IEEE, pp. 910-915, December 2011.
19 Matam, R. and Tripathy, S, "THWMP: trust based secure routing for wireless mesh networks," in Proc. of the 2011 International Conference on Communication, Computing & Security, ACM, pp. 40-45, February 2011.
20 Hwang, R. J. and Hsiao, Y. K., "A secure and reliable routing protocol for wireless mesh networks," Journal of Shanghai Jiaotong University (Science), vol. 19, no. 4, pp. 466-475, 2014.   DOI
21 Popalyar, F. and Yaqini, A., "A trust model based on evidence-based subjective logic for Securing wireless mesh networks," in Proc. of 21st Conference on Innovation in Clouds, Internet and Networks and workshops (ICIN), IEEE, February 2018.
22 Tan, H. C., Ma, M., Labiod, H., Chong, P. H. J. and Zhang, J., "A non-biased trust model for wireless mesh networks," International Journal of Communication Systems, vol. 30, no. 9, e3200, 2017.   DOI
23 Shafer, G., "A mathematical theory of evidence," Princeton university press, vol. 42, 1976.
24 Sen, J., "Secure routing in wireless mesh networks," arXiv preprint arXiv:1102.1226, 2011.
25 Mogaibel, H. A and Othman, M., "Review of routing protocols and it's metrics for wireless mesh networks," in Proc. of 2010 Second Pacific-Asia Conference on Circuits, Communications and System, pp. 27-30, 2010.
26 Akyildiz, I. F., Wang, X. and Wang, W, "Wireless mesh networks: a survey," Computer networks, vol. 47, no. 4, pp. 445-487, 2005.   DOI
27 Waharte, S., Boutaba, R., Iraqi, Y.,and Ishibashi, B. "Routing protocols in wireless mesh networks: Challenges and design considerations," Multimedia Tools and Applications, vol. 29, no. 3, pp. 285-303, 2006.   DOI
28 Campista, M. E. M., Esposito, P. M., Moraes, I. M., Costa, L. H. M., Duarte, O. C. M., Passos, D. G., and Rubinstein, M. G., "Routing metrics and protocols for wireless mesh networks," IEEE network, vol. 22, no. 1, pp. 6-12, 2008.   DOI
29 Lin, H., Hu, J., Ma, J., Xu, L. and Nagar, A., "A role based privacy-aware secure routing protocol for wireless mesh networks". Wireless Personal Communications, vol. 75, no. 3, pp. 1611-1633, 2014.   DOI
30 Lin, H., Ma, J., Hu, J., and Yang, K., "PA-SHWMP: a privacy-aware secure hybrid wireless mesh protocol for IEEE 802.11 s wireless mesh networks," EURASIP Journal on Wireless Communications and Networking, vol. 2012, p. 69, 2012.   DOI
31 Paris, S., Nita-Rotaru, C., Martignon, F. and Capone, A, "Cross-layer metrics for reliable routing in wireless mesh networks," IEEE/ACM Transactions on Networking (TON), vol. 21, no. 3, pp. 1003-1016, 2013.   DOI