Cargando…

A Security Analysis of the 802.11s Wireless Mesh Network Routing Protocol and Its Secure Routing Protocols

Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of...

Descripción completa

Detalles Bibliográficos
Autores principales: Tan, Whye Kit, Lee, Sang-Gon, Lam, Jun Huy, Yoo, Seong-Moo
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2013
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3821297/
https://www.ncbi.nlm.nih.gov/pubmed/24002231
http://dx.doi.org/10.3390/s130911553
_version_ 1782290278235766784
author Tan, Whye Kit
Lee, Sang-Gon
Lam, Jun Huy
Yoo, Seong-Moo
author_facet Tan, Whye Kit
Lee, Sang-Gon
Lam, Jun Huy
Yoo, Seong-Moo
author_sort Tan, Whye Kit
collection PubMed
description Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.
format Online
Article
Text
id pubmed-3821297
institution National Center for Biotechnology Information
language English
publishDate 2013
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-38212972013-11-09 A Security Analysis of the 802.11s Wireless Mesh Network Routing Protocol and Its Secure Routing Protocols Tan, Whye Kit Lee, Sang-Gon Lam, Jun Huy Yoo, Seong-Moo Sensors (Basel) Article Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP. MDPI 2013-09-02 /pmc/articles/PMC3821297/ /pubmed/24002231 http://dx.doi.org/10.3390/s130911553 Text en © 2013 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/).
spellingShingle Article
Tan, Whye Kit
Lee, Sang-Gon
Lam, Jun Huy
Yoo, Seong-Moo
A Security Analysis of the 802.11s Wireless Mesh Network Routing Protocol and Its Secure Routing Protocols
title A Security Analysis of the 802.11s Wireless Mesh Network Routing Protocol and Its Secure Routing Protocols
title_full A Security Analysis of the 802.11s Wireless Mesh Network Routing Protocol and Its Secure Routing Protocols
title_fullStr A Security Analysis of the 802.11s Wireless Mesh Network Routing Protocol and Its Secure Routing Protocols
title_full_unstemmed A Security Analysis of the 802.11s Wireless Mesh Network Routing Protocol and Its Secure Routing Protocols
title_short A Security Analysis of the 802.11s Wireless Mesh Network Routing Protocol and Its Secure Routing Protocols
title_sort security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3821297/
https://www.ncbi.nlm.nih.gov/pubmed/24002231
http://dx.doi.org/10.3390/s130911553
work_keys_str_mv AT tanwhyekit asecurityanalysisofthe80211swirelessmeshnetworkroutingprotocolanditssecureroutingprotocols
AT leesanggon asecurityanalysisofthe80211swirelessmeshnetworkroutingprotocolanditssecureroutingprotocols
AT lamjunhuy asecurityanalysisofthe80211swirelessmeshnetworkroutingprotocolanditssecureroutingprotocols
AT yooseongmoo asecurityanalysisofthe80211swirelessmeshnetworkroutingprotocolanditssecureroutingprotocols
AT tanwhyekit securityanalysisofthe80211swirelessmeshnetworkroutingprotocolanditssecureroutingprotocols
AT leesanggon securityanalysisofthe80211swirelessmeshnetworkroutingprotocolanditssecureroutingprotocols
AT lamjunhuy securityanalysisofthe80211swirelessmeshnetworkroutingprotocolanditssecureroutingprotocols
AT yooseongmoo securityanalysisofthe80211swirelessmeshnetworkroutingprotocolanditssecureroutingprotocols