Cargando…
A Security Analysis of the 802.11s Wireless Mesh Network Routing Protocol and Its Secure Routing Protocols
Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2013
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3821297/ https://www.ncbi.nlm.nih.gov/pubmed/24002231 http://dx.doi.org/10.3390/s130911553 |
_version_ | 1782290278235766784 |
---|---|
author | Tan, Whye Kit Lee, Sang-Gon Lam, Jun Huy Yoo, Seong-Moo |
author_facet | Tan, Whye Kit Lee, Sang-Gon Lam, Jun Huy Yoo, Seong-Moo |
author_sort | Tan, Whye Kit |
collection | PubMed |
description | Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP. |
format | Online Article Text |
id | pubmed-3821297 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2013 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-38212972013-11-09 A Security Analysis of the 802.11s Wireless Mesh Network Routing Protocol and Its Secure Routing Protocols Tan, Whye Kit Lee, Sang-Gon Lam, Jun Huy Yoo, Seong-Moo Sensors (Basel) Article Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP. MDPI 2013-09-02 /pmc/articles/PMC3821297/ /pubmed/24002231 http://dx.doi.org/10.3390/s130911553 Text en © 2013 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/). |
spellingShingle | Article Tan, Whye Kit Lee, Sang-Gon Lam, Jun Huy Yoo, Seong-Moo A Security Analysis of the 802.11s Wireless Mesh Network Routing Protocol and Its Secure Routing Protocols |
title | A Security Analysis of the 802.11s Wireless Mesh Network Routing Protocol and Its Secure Routing Protocols |
title_full | A Security Analysis of the 802.11s Wireless Mesh Network Routing Protocol and Its Secure Routing Protocols |
title_fullStr | A Security Analysis of the 802.11s Wireless Mesh Network Routing Protocol and Its Secure Routing Protocols |
title_full_unstemmed | A Security Analysis of the 802.11s Wireless Mesh Network Routing Protocol and Its Secure Routing Protocols |
title_short | A Security Analysis of the 802.11s Wireless Mesh Network Routing Protocol and Its Secure Routing Protocols |
title_sort | security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3821297/ https://www.ncbi.nlm.nih.gov/pubmed/24002231 http://dx.doi.org/10.3390/s130911553 |
work_keys_str_mv | AT tanwhyekit asecurityanalysisofthe80211swirelessmeshnetworkroutingprotocolanditssecureroutingprotocols AT leesanggon asecurityanalysisofthe80211swirelessmeshnetworkroutingprotocolanditssecureroutingprotocols AT lamjunhuy asecurityanalysisofthe80211swirelessmeshnetworkroutingprotocolanditssecureroutingprotocols AT yooseongmoo asecurityanalysisofthe80211swirelessmeshnetworkroutingprotocolanditssecureroutingprotocols AT tanwhyekit securityanalysisofthe80211swirelessmeshnetworkroutingprotocolanditssecureroutingprotocols AT leesanggon securityanalysisofthe80211swirelessmeshnetworkroutingprotocolanditssecureroutingprotocols AT lamjunhuy securityanalysisofthe80211swirelessmeshnetworkroutingprotocolanditssecureroutingprotocols AT yooseongmoo securityanalysisofthe80211swirelessmeshnetworkroutingprotocolanditssecureroutingprotocols |