Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Privacy preservation with RTT-based detection for wireless mesh networks

Privacy preservation with RTT-based detection for wireless mesh networks

For access to this article, please select a purchase option:

Buy article PDF
$19.95
(plus tax if applicable)
Buy Knowledge Pack
10 articles for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Wireless mesh networks (WMNs) upraised as superior technology offering all aspects of services as compared to conventional networks. Due to the absence of centralised authority, WMNs suffers from both external and internal attacks, which decrease the overall performance of WMNs. In this study, the authors proposed an efficient handoff authentication protocol with privacy preservation of nonce and transfer ticket against external attacks during handoff and proposed round trip time (RTT)-based detection protocol to resist against internal attacks in WMNs. For privacy preservation of nonce and transfer ticket, encryption of the nonce and transfer ticket during handoff authentication process was considered. For detection, the calculation of RTT and processing time to identify the malicious nodes forming wormhole link were considered. The proposed work prevents the AODV routing protocol against the wormhole attack in WMNs. The simulation of the proposed work was done using NS-3 simulator, and the experimental results show that the performance of the proposed method prevents WMNs from both external and internal attacks.

References

    1. 1)
      • 22. Kassab, M., Bonnin, J.M., Guillouard, K.: ‘Securing fast handover in WLANs: a ticket based proactive authentication scheme’. Globecom Workshops, Washington, DC, USA, 2007, pp. 16.
    2. 2)
      • 7. Altman, Y., Keren, A.Y.: U.S. Patent No. 9,479,523, US Patent and Trademark Office, Washington, DC, 2016.
    3. 3)
      • 36. Matam, R., Tripathy, S.: ‘WRSR: wormhole-resistant secure routing for wireless mesh networks’, EURASIP J. Wirel. Commun. Netw., 2013, 2013, (1), p. 180.
    4. 4)
      • 10. Yang, X., Huang, X., Han, J., et al: ‘Improved handover authentication and key predistribution for wireless mesh networks’, Concurrency Comput., Pract. Exp., 2016, 28, (10), pp. 29782990.
    5. 5)
      • 34. Biswas, J., Gupta, A., Singh, D.: ‘WADP: a wormhole attack detection and prevention technique in MANET using modified AODV routing protocol’. Proc. Ninth IEEE Int. Conf. on Industrial and Information Systems (ICIIS'14), Gwalior, India, 2014, pp. 16.
    6. 6)
      • 24. Fu, A., Zhang, G., Zhang, Y., et al: ‘An efficient group-based handover authentication mechanism for IEEE 802.16m networks’, Wirel. Pers. Commun., 2013, 70, (4), pp. 17931810.
    7. 7)
      • 26. Fu, A., Song, J., Li, S., et al: ‘A privacy-preserving group authentication protocol for machine-type communication in LTE/LTE-A networks’, Secur. Commun. Netw., 2016, 9, (13), pp. 20022014.
    8. 8)
      • 11. Du, W., Deng, J., Han, Y.S., et al: ‘A pairwise key predistribution scheme for wireless sensor networks’, ACM Trans. Inf. Syst.Secur., 2005, 8, (2), pp. 228258.
    9. 9)
      • 13. Kohl, J., Neuman, C.: ‘The Kerberos network authentication service’. vol. 5, No.RFC 1510, 1993.
    10. 10)
      • 31. Chan, K.S., Alam, M.R.: ‘Topological comparison-based wormhole detection for MANET’, Int. J. Commun. Syst., 2014, 27, (7), pp. 10511068.
    11. 11)
      • 15. Li, G., Ma, J., Jiang, Q., et al: ‘A novel re-authentication scheme based on tickets in wireless local area networks’, J. Parallel Distrib. Comput., 2011, 71, (7), pp. 906914.
    12. 12)
      • 29. Li, T., Ma, J., Sun, C.: ‘Netpro: detecting attacks in MANET routing with provenance and verification’, Sci. China Inform. Sci., 2017, 60, (11), p. 118101.
    13. 13)
      • 25. Yang, X., Huang, X., Han, J., et al: ‘Improved handover authentication and key pre-distribution for wireless mesh networks’, Concurrency Computa., Pract. Exp., 2016, 28, (10), pp. 29782990.
    14. 14)
      • 38. Li, C., Nguyen, U.T., Nguyen, H.L., et al: ‘Efficient authentication for fast handover in wireless mesh networks’, Comput. Secur., 2013, 37, pp. 124142.
    15. 15)
      • 19. Chaudhry, S.A., Farash, M.S., Naqvi, H., et al: ‘A robust and efficient privacy aware handover authentication scheme for wireless networks’, Wirel. Pers. Commun., 2017, 93, (2), pp. 311335.
    16. 16)
      • 14. Li, G., Chen, X., Ma, J.: ‘A ticket-based re-authentication scheme for fast handover in wireless local area networks’. Sixth Int. Conf. on Wireless Communications Networking and Mobile Computing (WiCOM), Chengdu, China, 2010, pp. 14.
    17. 17)
      • 27. Fu, A., Qin, N., Wang, Y., et al: ‘Nframe: a privacy-preserving with non-frameability handover authentication protocol based on (t, n) secret sharing for LTE/LTE-A networks’, Wirel. Netw., 2017, 23, (7), pp. 21652176.
    18. 18)
      • 30. Xie, T., Mo, J., Huang, B.: ‘A secure AODV protocol improvement scheme based on fuzzy neural network’. Int. Conf. on Security and Privacy in Communication Systems, Singapore, 2018, pp. 453467.
    19. 19)
      • 18. Wang, K., Wang, Y., Zeng, D., et al: ‘An SDN-based architecture for next-generation wireless networks’, IEEE Wirel. Commun., 2017, 24, (1), pp. 2531.
    20. 20)
      • 5. Khalil, I., Bagchi, S., Shroff, N.B.: ‘LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks’. The Int. Conf. on Dependable Systems and Networks (DSN), Yokohama, Japan, 2005, pp. 612621.
    21. 21)
      • 16. Blom, R.: ‘An optimal class of symmetric key generation systems’. Workshop on the Theory and Application of Cryptographic Techniques, Paris, France, 1984, pp. 335338.
    22. 22)
      • 37. Luan, L.Y, Fu, Y.F., Xiao, P., et al: ‘Preventing wormhole attacks in wireless mesh networks’, Appl. Mech. Mater., 2014, 443, pp. 440445.
    23. 23)
      • 6. Santhanam, L., Xie, B., Agrawal, D.P.: ‘Selfishness in mesh networks: wired multihop MANETs’, IEEE Wirel. Commun., 2008, 15, (4), pp. 1623.
    24. 24)
      • 12. Fu, A., Zhang, Y., Zhu, Z., et al: ‘A fast handover authentication mechanism based on ticket for IEEE 802.16 m’, IEEE Commun. Lett., 2010, 14, (2), pp. 11341136.
    25. 25)
      • 3. Seyedzadegan, M., Othman, M., Ali, B.M., et al: ‘Wireless mesh networks: WMN overview, WMN architecture’. Int. Conf. on Communication Engineering and Networks IPCSIT, 19, Singapore, 2011, p. 2.
    26. 26)
      • 1. Fu, Y., He, J., Wang, R., et al: ‘Mutual authentication in wireless mesh networks’. IEEE Int. Conf. on Communications, Beijing, People's Republic of China, 2008, pp. 16901694.
    27. 27)
      • 9. Tie, L., Yi, Y.: ‘Extended security analysis of multi-hop ticket based handover authentication protocol in the 802.16 j network’. Eighth Int. Conf. on Wireless Communications, Networking and Mobile Computing (WiCOM), Shanghai, People's Republic of China, 2012, pp. 110.
    28. 28)
      • 32. Dromard, J., Khatoun, R., Khoukhi, L.: ‘A watchdog extension scheme considering packet loss for a reputation system in wireless mesh network’. Proc. 20th Int. Conf. on Telecommunications (ICT ‘13), Casablanca, Morocco, 2013, pp. 15.
    29. 29)
      • 39. Tran, P.V., Hung, L.X., Lee, Y.K., et al: ‘TTM: transmission time-based mechanism to detect wormhole attacks’. The 2nd IEEE Asia-Pacific Service Computing Conference (APSCC 2007), Tsukuba Science City, Japan, 2007, pp. 172178.
    30. 30)
      • 17. Khedr, W.I., Abdalla, M.I., Elsheikh, A.A.: ‘Enhanced inter-access service network handover authentication scheme for IEEE 802.16m network’, IET Inf. Sec., 2015, 9, (6), pp. 334343.
    31. 31)
      • 35. Patel, M. M., Aggarwal, A.: ‘Two phase wormhole detection approach for dynamic wireless sensor networks’. Proc. IEEE Int. Conf. on Wireless Communications, Signal Processing and Networking (WiSPNET'16), Chennai, India, 2016, pp. 21092112.
    32. 32)
      • 8. Jing, Q., Zhang, Y., Fu, A., et al: ‘A privacy preserving handover authentication scheme for EAP-based wireless networks’. Global Telecommunications Conf. (GLOBECOM 2011), Houston, Texas, USA, 2011, pp. 16.
    33. 33)
      • 28. Li, T., Ma, J., Sun, C.: ‘SRDPV: secure route discovery and privacy-preserving verification in MANETs’, Wirel. Netw., 2019, 25, (4), pp. 17311747.
    34. 34)
      • 33. Capkun, S., Buttyán, L., Hubaux, J.P.: ‘SECTOR: secure tracking of node encounters in multi-hop wireless networks’. Proc. First ACM Workshop on SECURITY of ad hoc and Sensor Networks, Washington, USA, 2003, pp. 2132.
    35. 35)
      • 20. Srivatsa, A. M., Xie, J.: ‘A performance study of mobile handoff delay in IEEE 802.11-based wireless mesh networks’. 2008 IEEE Int. Conf. on Communications, Beijing, China, 2008, pp. 24852489.
    36. 36)
      • 23. Qazi, S., Mu, Y., Susilo, W.: ‘Securing wireless mesh networks with ticket-based authentication’. Second Int. Conf. on Signal Processing and Communication Systems, Australia, 2008, pp. 110.
    37. 37)
      • 4. He, D., Chan, S., Guizani, M.: ‘Handover authentication for mobile networks: security and efficiency aspects’, IEEE Netw., 2015, 29, (3), pp. 96103.
    38. 38)
      • 2. Akyildiz, I.F., Wang, X.: ‘A survey on wireless mesh networks’, IEEE Commun. Mag., 2005, 43, (9), pp. S23S30.
    39. 39)
      • 21. Xu, L., He, Y., Chen, X., et al: ‘Ticket-based handoff authentication for wireless mesh networks’, Comput. Netw., 2014, 73, pp. 185194.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2019.0492
Loading

Related content

content/journals/10.1049/iet-ifs.2019.0492
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address