A Study of Mitigating Misrouting Through Multi-Radio Multi-Channel MAC (M2-MAC) Protocol For Wireless Mesh Networks

Authors

  • Boopathy P  Curriculum Developer, PANACEA Research Midway, Chennai, Tamil Nadu, India

Keywords:

M2-MAC protocol, Wireless Mesh Networks, Stealthy Attack, Routing Misbehaviour.

Abstract

Much of the current research in wireless mesh networks has focused on protocols, algorithms and authentication schemes for protecting the data during data transmission. The wireless mesh network communication has become an explicating and important technology in recent years because of the rapid proliferation of wireless devices. WMN are highly vulnerable to attacks due to the open medium, dynamically changing network topology. This paper proposes and evaluates strategies to build reliable and secure communication in multi –radio multi-channel mesh networks using M2-MAC protocol. Therefore, we analyse mitigating misrouting in wireless multi- radio multi-channel using M2-MAC protocol and extensively show that our scheme provides very good enhancements in a variety of scenarios.

References

  1. http://pervasiveia.com/blog/cross- channel-definition
  2. M. Zapata, N. Asokan, Securing ad hoc routing protocols, ACM Workshop on Wireless Secuirty (WiSe), September 2002, pp. 1–10.
  3. Y. Hu, A. Perrig, D. Johnson, Ariadne: a secure ondemand  routing protocol for ad hoc networks, in: ACM Annual International Conference on Mobile Computing and Networking (MOBICOM), September 2002, pp. 12– 23.
  4. N. Borisov, I. Goldberg, D. Wagner, Intercepting mobile communications: the insecurity of 802.11, in: ACM Annual International Conference on Mobile Computing and Networking (MOBICOM), September 2002, pp. 180–188.
  5. L. Buttyan, J.-P. Hubaux, Rational exchange—a formal model based on game theory, in: 2nd International Workshop on Electronic Commerce, November 2001.
  6. K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields, E.M. Belding-Royer, A secure protocol for ad hoc networks, in: IEEE International Conference on Network Protocols (ICNP), 2002, pp. 78–87.
  7. Y. Hu, A. Perrig, D. Johnson, Packet leashes: a defense against wormhole attacks in wireless networks, in: IEEE Annual Conference on Computer Communications (INFOCOM), 2003, pp. 1976–1986.
  8. W. Stallings, “Cryptography and Network Security: Principles and Practice”, Fifth Edition, Prentice Hall, 2010.
  9. A. J. Menezes, P. C. V. Oorschot, and S. A. Vanstone, “Handbook of Applied Cryptography”, CRC Press, ISBN: 0849385237, 1996.
  10. C. Gandhi and M. Dave, “A Review of Security in Mobile Ad Hoc Networks”, IETE Technical Review, ISSN: 02564602, pp.335-344, Vol. 23, No. 6, 2006
  11. H. Yang, H. Luo, F. Ye, S. Lu, L. Zhang, Security in mobile ad hoc networks: challenges and solutions, IEEE Wireless Communications 11 (1) (2004) 38–47.
  12. C. Siva Ram Murthy and B.S Manoj, “Ad Hoc Wireless Networks: Architectures and Protocols”, Pearson Education, ISBN: 978-81-317-0688-6, 2006.
  13. M. Jakobsson, S. Wetzel and B. Yener, “Stealth Attacks on Ad Hoc Wireless Networks”, Proceedings of IEEE 58th Vehicular Technology Conference, pp.2103-2111, Vol.3, 2003.
  14. Issa Khalil, saurabh bagchi, cristina N. rotaru, Ness . Shroff. “ UNMASK: Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks. Ad hoc netw (2009).
  15. Issa Khalil, saurabh bagchi, MISPAR: Mitigating stealthy packet droping in locally monitores multi hop wireless Ad Hoc Networks, SecureCom 2008.
  16. I. Khalil, S. Bagchi, and N. Shroff, “LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks,” Proc. Int’l Conf. Dependable Systems and Networks (DSN ’05), pp. 612-621, 2005.
  17. IEEE 802.11a: Wireless LAM Medium Access Control (MAC) and Physical Layer (PHY) Specifications – Amendment 1: High-speed Physical Layer in the 5 GHz band”. IEEE, 1999.
  18. Marco A. Marsan, Daniele Roffinella. “Multichannel Local Area Network Protocols”. IEEE JSAC, vol. SAC-1, no.5, November 1983. pp.885-897.
  19. A. Nasipuri, J. Zhuang, and S.R. Das. “A Multichannel CSMA MAC Protocol for Multihop Wireless Network”. IEEE Wireless Communications and Networking Conference (WCNC'99), 1999.
  20. Elvino S. Sousa, and John. A. Silvester. “Spreading Code Protocol for Distributed Spread-Spectrum Packet Radio Networks”. IEEE Transactions on Communications, Vol.36 No.3, March 1988. Page 272-281.
  21. Ian F. Akyildiz , Xudong Wang , Weilin Wang Wireless mesh networks: a survey Broadband and Wireless Networking (BWN) Lab, School of Electrical and Computer Engineering, Received 1June 2004; received in revised form 1November 2004; accepted 20 December 2004.
  22. Bingxuan zhao and shigeru shimamoto “Two stage coordination Mulyi-Radio Muli-Channel MAC Protocol for Wireless Mesh Networks”, School of information and telecommunication, Tokyo,(IJCNC)volume3,No4,Jul2011.
  23. http://www.javvin.com/protocols.

Downloads

Published

2017-12-31

Issue

Section

Research Articles

How to Cite

[1]
Boopathy P, " A Study of Mitigating Misrouting Through Multi-Radio Multi-Channel MAC (M2-MAC) Protocol For Wireless Mesh Networks , IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.509-515, November-December-2017.