access icon free Privacy preservation with RTT-based detection for wireless mesh networks

Wireless mesh networks (WMNs) upraised as superior technology offering all aspects of services as compared to conventional networks. Due to the absence of centralised authority, WMNs suffers from both external and internal attacks, which decrease the overall performance of WMNs. In this study, the authors proposed an efficient handoff authentication protocol with privacy preservation of nonce and transfer ticket against external attacks during handoff and proposed round trip time (RTT)-based detection protocol to resist against internal attacks in WMNs. For privacy preservation of nonce and transfer ticket, encryption of the nonce and transfer ticket during handoff authentication process was considered. For detection, the calculation of RTT and processing time to identify the malicious nodes forming wormhole link were considered. The proposed work prevents the AODV routing protocol against the wormhole attack in WMNs. The simulation of the proposed work was done using NS-3 simulator, and the experimental results show that the performance of the proposed method prevents WMNs from both external and internal attacks.

Inspec keywords: data privacy; cryptographic protocols; message authentication; protocols; wireless mesh networks; routing protocols; radio networks; telecommunication security; mobility management (mobile radio); telecommunication network topology

Other keywords: external attacks; handoff authentication process; wireless mesh networks; WMNs; efficient handoff authentication protocol; nonce; privacy preservation; wormhole attack; internal attacks; transfer ticket; centralised authority; RTT-based detection; trip time-based detection protocol

Subjects: Radio links and equipment; Communication network design, planning and routing; Protocols; Computer communications; Protocols; Data security; Mobile radio systems; Cryptography

References

    1. 1)
      • 22. Kassab, M., Bonnin, J.M., Guillouard, K.: ‘Securing fast handover in WLANs: a ticket based proactive authentication scheme’. Globecom Workshops, Washington, DC, USA, 2007, pp. 16.
    2. 2)
      • 7. Altman, Y., Keren, A.Y.: U.S. Patent No. 9,479,523, US Patent and Trademark Office, Washington, DC, 2016.
    3. 3)
      • 36. Matam, R., Tripathy, S.: ‘WRSR: wormhole-resistant secure routing for wireless mesh networks’, EURASIP J. Wirel. Commun. Netw., 2013, 2013, (1), p. 180.
    4. 4)
      • 10. Yang, X., Huang, X., Han, J., et al: ‘Improved handover authentication and key predistribution for wireless mesh networks’, Concurrency Comput., Pract. Exp., 2016, 28, (10), pp. 29782990.
    5. 5)
      • 34. Biswas, J., Gupta, A., Singh, D.: ‘WADP: a wormhole attack detection and prevention technique in MANET using modified AODV routing protocol’. Proc. Ninth IEEE Int. Conf. on Industrial and Information Systems (ICIIS'14), Gwalior, India, 2014, pp. 16.
    6. 6)
      • 24. Fu, A., Zhang, G., Zhang, Y., et al: ‘An efficient group-based handover authentication mechanism for IEEE 802.16m networks’, Wirel. Pers. Commun., 2013, 70, (4), pp. 17931810.
    7. 7)
      • 26. Fu, A., Song, J., Li, S., et al: ‘A privacy-preserving group authentication protocol for machine-type communication in LTE/LTE-A networks’, Secur. Commun. Netw., 2016, 9, (13), pp. 20022014.
    8. 8)
      • 11. Du, W., Deng, J., Han, Y.S., et al: ‘A pairwise key predistribution scheme for wireless sensor networks’, ACM Trans. Inf. Syst.Secur., 2005, 8, (2), pp. 228258.
    9. 9)
      • 13. Kohl, J., Neuman, C.: ‘The Kerberos network authentication service’. vol. 5, No.RFC 1510, 1993.
    10. 10)
      • 31. Chan, K.S., Alam, M.R.: ‘Topological comparison-based wormhole detection for MANET’, Int. J. Commun. Syst., 2014, 27, (7), pp. 10511068.
    11. 11)
      • 15. Li, G., Ma, J., Jiang, Q., et al: ‘A novel re-authentication scheme based on tickets in wireless local area networks’, J. Parallel Distrib. Comput., 2011, 71, (7), pp. 906914.
    12. 12)
      • 29. Li, T., Ma, J., Sun, C.: ‘Netpro: detecting attacks in MANET routing with provenance and verification’, Sci. China Inform. Sci., 2017, 60, (11), p. 118101.
    13. 13)
      • 25. Yang, X., Huang, X., Han, J., et al: ‘Improved handover authentication and key pre-distribution for wireless mesh networks’, Concurrency Computa., Pract. Exp., 2016, 28, (10), pp. 29782990.
    14. 14)
      • 38. Li, C., Nguyen, U.T., Nguyen, H.L., et al: ‘Efficient authentication for fast handover in wireless mesh networks’, Comput. Secur., 2013, 37, pp. 124142.
    15. 15)
      • 19. Chaudhry, S.A., Farash, M.S., Naqvi, H., et al: ‘A robust and efficient privacy aware handover authentication scheme for wireless networks’, Wirel. Pers. Commun., 2017, 93, (2), pp. 311335.
    16. 16)
      • 14. Li, G., Chen, X., Ma, J.: ‘A ticket-based re-authentication scheme for fast handover in wireless local area networks’. Sixth Int. Conf. on Wireless Communications Networking and Mobile Computing (WiCOM), Chengdu, China, 2010, pp. 14.
    17. 17)
      • 27. Fu, A., Qin, N., Wang, Y., et al: ‘Nframe: a privacy-preserving with non-frameability handover authentication protocol based on (t, n) secret sharing for LTE/LTE-A networks’, Wirel. Netw., 2017, 23, (7), pp. 21652176.
    18. 18)
      • 30. Xie, T., Mo, J., Huang, B.: ‘A secure AODV protocol improvement scheme based on fuzzy neural network’. Int. Conf. on Security and Privacy in Communication Systems, Singapore, 2018, pp. 453467.
    19. 19)
      • 18. Wang, K., Wang, Y., Zeng, D., et al: ‘An SDN-based architecture for next-generation wireless networks’, IEEE Wirel. Commun., 2017, 24, (1), pp. 2531.
    20. 20)
      • 5. Khalil, I., Bagchi, S., Shroff, N.B.: ‘LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks’. The Int. Conf. on Dependable Systems and Networks (DSN), Yokohama, Japan, 2005, pp. 612621.
    21. 21)
      • 16. Blom, R.: ‘An optimal class of symmetric key generation systems’. Workshop on the Theory and Application of Cryptographic Techniques, Paris, France, 1984, pp. 335338.
    22. 22)
      • 37. Luan, L.Y, Fu, Y.F., Xiao, P., et al: ‘Preventing wormhole attacks in wireless mesh networks’, Appl. Mech. Mater., 2014, 443, pp. 440445.
    23. 23)
      • 6. Santhanam, L., Xie, B., Agrawal, D.P.: ‘Selfishness in mesh networks: wired multihop MANETs’, IEEE Wirel. Commun., 2008, 15, (4), pp. 1623.
    24. 24)
      • 12. Fu, A., Zhang, Y., Zhu, Z., et al: ‘A fast handover authentication mechanism based on ticket for IEEE 802.16 m’, IEEE Commun. Lett., 2010, 14, (2), pp. 11341136.
    25. 25)
      • 3. Seyedzadegan, M., Othman, M., Ali, B.M., et al: ‘Wireless mesh networks: WMN overview, WMN architecture’. Int. Conf. on Communication Engineering and Networks IPCSIT, 19, Singapore, 2011, p. 2.
    26. 26)
      • 1. Fu, Y., He, J., Wang, R., et al: ‘Mutual authentication in wireless mesh networks’. IEEE Int. Conf. on Communications, Beijing, People's Republic of China, 2008, pp. 16901694.
    27. 27)
      • 9. Tie, L., Yi, Y.: ‘Extended security analysis of multi-hop ticket based handover authentication protocol in the 802.16 j network’. Eighth Int. Conf. on Wireless Communications, Networking and Mobile Computing (WiCOM), Shanghai, People's Republic of China, 2012, pp. 110.
    28. 28)
      • 32. Dromard, J., Khatoun, R., Khoukhi, L.: ‘A watchdog extension scheme considering packet loss for a reputation system in wireless mesh network’. Proc. 20th Int. Conf. on Telecommunications (ICT ‘13), Casablanca, Morocco, 2013, pp. 15.
    29. 29)
      • 39. Tran, P.V., Hung, L.X., Lee, Y.K., et al: ‘TTM: transmission time-based mechanism to detect wormhole attacks’. The 2nd IEEE Asia-Pacific Service Computing Conference (APSCC 2007), Tsukuba Science City, Japan, 2007, pp. 172178.
    30. 30)
      • 17. Khedr, W.I., Abdalla, M.I., Elsheikh, A.A.: ‘Enhanced inter-access service network handover authentication scheme for IEEE 802.16m network’, IET Inf. Sec., 2015, 9, (6), pp. 334343.
    31. 31)
      • 35. Patel, M. M., Aggarwal, A.: ‘Two phase wormhole detection approach for dynamic wireless sensor networks’. Proc. IEEE Int. Conf. on Wireless Communications, Signal Processing and Networking (WiSPNET'16), Chennai, India, 2016, pp. 21092112.
    32. 32)
      • 8. Jing, Q., Zhang, Y., Fu, A., et al: ‘A privacy preserving handover authentication scheme for EAP-based wireless networks’. Global Telecommunications Conf. (GLOBECOM 2011), Houston, Texas, USA, 2011, pp. 16.
    33. 33)
      • 28. Li, T., Ma, J., Sun, C.: ‘SRDPV: secure route discovery and privacy-preserving verification in MANETs’, Wirel. Netw., 2019, 25, (4), pp. 17311747.
    34. 34)
      • 33. Capkun, S., Buttyán, L., Hubaux, J.P.: ‘SECTOR: secure tracking of node encounters in multi-hop wireless networks’. Proc. First ACM Workshop on SECURITY of ad hoc and Sensor Networks, Washington, USA, 2003, pp. 2132.
    35. 35)
      • 20. Srivatsa, A. M., Xie, J.: ‘A performance study of mobile handoff delay in IEEE 802.11-based wireless mesh networks’. 2008 IEEE Int. Conf. on Communications, Beijing, China, 2008, pp. 24852489.
    36. 36)
      • 23. Qazi, S., Mu, Y., Susilo, W.: ‘Securing wireless mesh networks with ticket-based authentication’. Second Int. Conf. on Signal Processing and Communication Systems, Australia, 2008, pp. 110.
    37. 37)
      • 4. He, D., Chan, S., Guizani, M.: ‘Handover authentication for mobile networks: security and efficiency aspects’, IEEE Netw., 2015, 29, (3), pp. 96103.
    38. 38)
      • 2. Akyildiz, I.F., Wang, X.: ‘A survey on wireless mesh networks’, IEEE Commun. Mag., 2005, 43, (9), pp. S23S30.
    39. 39)
      • 21. Xu, L., He, Y., Chen, X., et al: ‘Ticket-based handoff authentication for wireless mesh networks’, Comput. Netw., 2014, 73, pp. 185194.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2019.0492
Loading

Related content

content/journals/10.1049/iet-ifs.2019.0492
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading