Secure Neighbor Verification Protocol in Wireless Mesh Networks
نویسندگان
چکیده
The main motivation of an attacker is to convince two far away nodes as neighbor nodes using wormhole attack easily without the knowledge of cryptographic primitives. Thus, it can significantly degrade the performance of Wireless Mesh Networks (WMNs). Secure neighbor discovery is a fundamental requirement of network nodes to ensure secure data communication. An adversary that bypass neighbor discovery process of a legitimate node using wormhole attack can disrupt the overlying protocols and applications. In this paper, we propose a secure neighbor verification mechanism to thwart wormhole attack that can prevent bogus links from being involved in the network operations. It employs node ranking scheme to compute relative distance between neighbors and uses connectivity information to check the genuinity of neighborhood creation. We evaluate our mechanism using simulation to demonstrate the efficiency in the presence of wormholes.
منابع مشابه
Two secure and energy-saving spontaneous ad-hoc protocol for wireless mesh client networks
We can find many cases where a spontaneous wireless ad-hoc network must be built for a limited period of time in a wireless mesh network: meetings, conferences, etc. One of the main aspects in a spontaneous network is to provide security mechanisms to the users. Confidentially, integrity, authentication, availability and no-repudiation should be provided for all the users in the network and the...
متن کاملAn efficient symmetric polynomial-based key establishment protocol for wireless sensor networks
An essential requirement for providing secure services in wireless sensor networks is the ability to establish pairwise keys among sensors. Due to resource constraints on the sensors, the key establishment scheme should not create significant overhead. To date, several key establishment schemes have been proposed. Some of these have appropriate connectivity and resistance against key exposure, ...
متن کاملA Low-Cost Secure Neighbor Verification Protocol for Wireless Sensor Networks
Wireless networking relies on a fundamental building block, neighbor discovery (ND). However, the nature of wireless communications makes attacks against ND easy: an adversary can simply replay or relay (wormhole) packets across the network and mislead disconnected nodes they communicate directly. Such attacks can compromise the overlying protocols and applications. Proposals in the literature ...
متن کاملSecure and Efficient Multi-hop Routing for Wireless Mesh Networks
Wireless Mesh Networks (WMNs) are defined as the infrastructure network working with in as ad-hoc mode. In a multi-hop WMNs, it is forever preferable to choose a path with higher throughput between source and destination nodes to utilize the network capacity. Providing security in WMNs has become an important issue over the last few years. In this paper, we propose a new protocol called Secure ...
متن کاملAn efficient solution for management of pre-distribution in wireless sensor networks
A sensor node is composed of different parts including processing units, sensor, transmitter, receiver, and security unit. There are many nodes in a sensor unit. These networks can be used for military, industrial, medicine, environmental, house, and many other applications. These nodes may be established in the lands of enemies to monitor the relations. Hence, it is important to consider conse...
متن کامل