A Study of Mitigating Misrouting Through Multi-Radio Multi-Channel MAC (M2-MAC) Protocol For Wireless Mesh Networks

Authors(1) :-Boopathy P

Much of the current research in wireless mesh networks has focused on protocols, algorithms and authentication schemes for protecting the data during data transmission. The wireless mesh network communication has become an explicating and important technology in recent years because of the rapid proliferation of wireless devices. WMN are highly vulnerable to attacks due to the open medium, dynamically changing network topology. This paper proposes and evaluates strategies to build reliable and secure communication in multi –radio multi-channel mesh networks using M2-MAC protocol. Therefore, we analyse mitigating misrouting in wireless multi- radio multi-channel using M2-MAC protocol and extensively show that our scheme provides very good enhancements in a variety of scenarios.

Authors and Affiliations

Boopathy P
Curriculum Developer, PANACEA Research Midway, Chennai, Tamil Nadu, India

M2-MAC protocol, Wireless Mesh Networks, Stealthy Attack, Routing Misbehaviour.

  1. http://pervasiveia.com/blog/cross- channel-definition
  2. M. Zapata, N. Asokan, Securing ad hoc routing protocols, ACM Workshop on Wireless Secuirty (WiSe), September 2002, pp. 1–10.
  3. Y. Hu, A. Perrig, D. Johnson, Ariadne: a secure ondemand  routing protocol for ad hoc networks, in: ACM Annual International Conference on Mobile Computing and Networking (MOBICOM), September 2002, pp. 12– 23.
  4. N. Borisov, I. Goldberg, D. Wagner, Intercepting mobile communications: the insecurity of 802.11, in: ACM Annual International Conference on Mobile Computing and Networking (MOBICOM), September 2002, pp. 180–188.
  5. L. Buttyan, J.-P. Hubaux, Rational exchange—a formal model based on game theory, in: 2nd International Workshop on Electronic Commerce, November 2001.
  6. K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields, E.M. Belding-Royer, A secure protocol for ad hoc networks, in: IEEE International Conference on Network Protocols (ICNP), 2002, pp. 78–87.
  7. Y. Hu, A. Perrig, D. Johnson, Packet leashes: a defense against wormhole attacks in wireless networks, in: IEEE Annual Conference on Computer Communications (INFOCOM), 2003, pp. 1976–1986.
  8. W. Stallings, “Cryptography and Network Security: Principles and Practice”, Fifth Edition, Prentice Hall, 2010.
  9. A. J. Menezes, P. C. V. Oorschot, and S. A. Vanstone, “Handbook of Applied Cryptography”, CRC Press, ISBN: 0849385237, 1996.
  10. C. Gandhi and M. Dave, “A Review of Security in Mobile Ad Hoc Networks”, IETE Technical Review, ISSN: 02564602, pp.335-344, Vol. 23, No. 6, 2006
  11. H. Yang, H. Luo, F. Ye, S. Lu, L. Zhang, Security in mobile ad hoc networks: challenges and solutions, IEEE Wireless Communications 11 (1) (2004) 38–47.
  12. C. Siva Ram Murthy and B.S Manoj, “Ad Hoc Wireless Networks: Architectures and Protocols”, Pearson Education, ISBN: 978-81-317-0688-6, 2006.
  13. M. Jakobsson, S. Wetzel and B. Yener, “Stealth Attacks on Ad Hoc Wireless Networks”, Proceedings of IEEE 58th Vehicular Technology Conference, pp.2103-2111, Vol.3, 2003.
  14. Issa Khalil, saurabh bagchi, cristina N. rotaru, Ness . Shroff. “ UNMASK: Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks. Ad hoc netw (2009).
  15. Issa Khalil, saurabh bagchi, MISPAR: Mitigating stealthy packet droping in locally monitores multi hop wireless Ad Hoc Networks, SecureCom 2008.
  16. I. Khalil, S. Bagchi, and N. Shroff, “LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks,” Proc. Int’l Conf. Dependable Systems and Networks (DSN ’05), pp. 612-621, 2005.
  17. IEEE 802.11a: Wireless LAM Medium Access Control (MAC) and Physical Layer (PHY) Specifications – Amendment 1: High-speed Physical Layer in the 5 GHz band”. IEEE, 1999.
  18. Marco A. Marsan, Daniele Roffinella. “Multichannel Local Area Network Protocols”. IEEE JSAC, vol. SAC-1, no.5, November 1983. pp.885-897.
  19. A. Nasipuri, J. Zhuang, and S.R. Das. “A Multichannel CSMA MAC Protocol for Multihop Wireless Network”. IEEE Wireless Communications and Networking Conference (WCNC'99), 1999.
  20. Elvino S. Sousa, and John. A. Silvester. “Spreading Code Protocol for Distributed Spread-Spectrum Packet Radio Networks”. IEEE Transactions on Communications, Vol.36 No.3, March 1988. Page 272-281.
  21. Ian F. Akyildiz , Xudong Wang , Weilin Wang Wireless mesh networks: a survey Broadband and Wireless Networking (BWN) Lab, School of Electrical and Computer Engineering, Received 1June 2004; received in revised form 1November 2004; accepted 20 December 2004.
  22. Bingxuan zhao and shigeru shimamoto “Two stage coordination Mulyi-Radio Muli-Channel MAC Protocol for Wireless Mesh Networks”, School of information and telecommunication, Tokyo,(IJCNC)volume3,No4,Jul2011.
  23. http://www.javvin.com/protocols.

Publication Details

Published in : Volume 2 | Issue 6 | November-December 2017
Date of Publication : 2017-12-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 509-515
Manuscript Number : CSEIT172589
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Boopathy P, "A Study of Mitigating Misrouting Through Multi-Radio Multi-Channel MAC (M2-MAC) Protocol For Wireless Mesh Networks ", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.509-515, November-December-2017.
Journal URL : http://ijsrcseit.com/CSEIT172589

Article Preview

Follow Us

Contact Us