This paper proposes a new Energyefficient Survivable Routing Protocol(ESRP)based on solar energy and wind mixed for power supply in green wireless mesh networks(WMNs).The ESRP combines hop penalty strategy and floodin...This paper proposes a new Energyefficient Survivable Routing Protocol(ESRP)based on solar energy and wind mixed for power supply in green wireless mesh networks(WMNs).The ESRP combines hop penalty strategy and flooding delaying strategy to improve the performances of traditional routing protocol.This paper uses QualNet to simulate and verify the performances of proposed ESRP.Compared with the traditional routing protocol,the simulation results show that the energy utilization of ESRP is more efficient by 13%.At the same time,ESRP is more load-balanced to postpone the appearance of the first energy depletion node and reduce the number of energy depletion nodes,and thus it effectively improves network survivability.展开更多
Cognitive Wireless Mesh Networks(CWMN) is a novel wireless network which combines the advantage of Cognitive Radio(CR) and wireless mesh networks.CWMN can realize seamless in-tegration of heterogeneous wireless networ...Cognitive Wireless Mesh Networks(CWMN) is a novel wireless network which combines the advantage of Cognitive Radio(CR) and wireless mesh networks.CWMN can realize seamless in-tegration of heterogeneous wireless networks and achieve better radio resource utilization.However,it is particularly vulnerable due to its features of open medium,dynamic spectrum,dynamic topology,and multi-top routing,etc..Being a dynamic positive security strategy,intrusion detection can provide powerful safeguard to CWMN.In this paper,we introduce trust mechanism into CWMN with intrusion detection and present a trust establishment model based on intrusion detection.Node trust degree and the trust degree of data transmission channels between nodes are defined and an algorithm of calcu-lating trust degree is given based on distributed detection of attack to networks.A channel assignment and routing scheme is proposed,in which selects the trusted nodes and allocates data channel with high trust degree for the transmission between neighbor nodes to establish a trusted route.Simulation re-sults indicate that the scheme can vary channel allocation and routing dynamically according to network security state so as to avoid suspect nodes and unsafe channels,and improve the packet safe delivery fraction effectively.展开更多
This paper provides a deep evaluation of the energy consumption of routing protocols. The evaluation is done along with other metrics such as throughput and packet delivery ratio (PDR). We introduce two more metrics t...This paper provides a deep evaluation of the energy consumption of routing protocols. The evaluation is done along with other metrics such as throughput and packet delivery ratio (PDR). We introduce two more metrics to capture the efficiency of the energy consumption: e-throughput and e-PDR. Both are ratios in relation to the energy. We consider the three low layers of the stack. Three types of routing protocols are used: proactive, reactive, and hybrid. At the MAC and PHY layer, three radio types are considered: 802.11a/b/g. Finally, the number of nodes is varying in random topologies, with nodes being static or mobile. Simulations are conducted using NS3. The parameters of a real network interface card are used. From the results in mobile position scenarios, no protocol is outperforming the others;even if OLSR has the lowest energy consumption, most of the time. However, in constant position scenarios, AODV consumed a lower energy, apart from the scenarios using the 802.11a standard where HWMP energy consumption is the lowest. Regarding the energy efficiency, AODV protocols provided the best e-throughput and OLSR the best e-PDR in overall configurations. A framework for selecting energy-efficient routing protocol depending on network characteristics is proposed at the end.展开更多
Communication security is a critical aspect of QoS provisioning in wireless mesh network (WMN). Because of the inherent characteristics of WMN, conventional security mechanisms cannot be applied. In order to guarant...Communication security is a critical aspect of QoS provisioning in wireless mesh network (WMN). Because of the inherent characteristics of WMN, conventional security mechanisms cannot be applied. In order to guarantee the communication security, a novel communication security mechanism is proposed. The mechanism uses a communication encryption scheme to encrypt data packets and employs a risk avoidance scheme to avoid the malicious nodes during communications. Simulation results indicate that the mechanism is able to provide secure communication effectively and reduce the damage of attacks through multiple paths.展开更多
Wireless sensor networks (WSNs) consist of a large number of sensor nodes that monitor the environment and a few base stations that collect the sensor readings. Individual sensor nodes are subject to compromised secur...Wireless sensor networks (WSNs) consist of a large number of sensor nodes that monitor the environment and a few base stations that collect the sensor readings. Individual sensor nodes are subject to compromised security because they may be deployed in hostile environments and each sensor node communicates wirelessly. An adversary can inject false reports into the networks via compromised nodes. Furthermore, an adversary can create a wormhole by directly linking two compromised nodes or using out-of-band channels. If these two kinds of attacks occur simultaneously in a network, existing methods cannot defend against them adequately. We thus propose a secure routing method for detecting false report injections and wormhole attacks in wireless sensor networks. The proposed method uses ACK messages for detecting wormholes and is based on a statistical en-route filtering (SEF) scheme for detecting false reports. Simulation results show that the proposed method reduces energy consumption by up to 20% and provide greater network security.展开更多
A proactive routing protocol CL-OLSR (cross-layer based optimized link state routing) by using a brand-new routing metric CLM (cross-layer metric) is proposed. CL-OLSR takes into account four link quality impact f...A proactive routing protocol CL-OLSR (cross-layer based optimized link state routing) by using a brand-new routing metric CLM (cross-layer metric) is proposed. CL-OLSR takes into account four link quality impact factors in route calculation through the cross-layer operation mechanism: the node available bandwidth, the node load, the link delivery rate, and the link interference, and thus the effect of route selection is optimized greatly. The simulation results show that the proposed CL-OLSR protocol can not only improve the network throughput to a large extent, but also reduce the end-to-end delay, while achieving load balance route results.展开更多
As an extension of wireless ad hoc and sensor networks, wireless mesh networks(WMNs) are employed as an emerging key solution for wireless broadband connectivity improvement. Due to the lack of physical security guara...As an extension of wireless ad hoc and sensor networks, wireless mesh networks(WMNs) are employed as an emerging key solution for wireless broadband connectivity improvement. Due to the lack of physical security guarantees, WMNs are susceptible to various kinds of attack. In this paper, we focus on node social selfish attack, which decreases network performance significantly. Since this type of attack is not obvious to detect, we propose a security routing scheme based on social network and reputation evaluation to solve this attack issue. First, we present a dynamic reputation model to evaluate a node's routing behavior, from which we can identify selfish attacks and selfish nodes. Furthermore, a social characteristic evaluation model is studied to evaluate the social relationship among nodes. Groups are built based on the similarity of node social status and we can get a secure routing based on these social groups of nodes. In addition, in our scheme, nodes are encouraged to enter into multiple groups and friend nodes are recommended to join into groups to reduce the possibility of isolated nodes. Simulation results demonstrate that our scheme is able to reflect node security status, and routings are chosen and adjusted according to security status timely and accurately so that the safety and reliability of routing are improved.展开更多
IEEE 802.16 mesh mode defines routing tree for transmitting data in centralized scheduling but it does not define any explicit proposal for combining uplink and downlink subframes. Deploying combined uplink and downli...IEEE 802.16 mesh mode defines routing tree for transmitting data in centralized scheduling but it does not define any explicit proposal for combining uplink and downlink subframes. Deploying combined uplink and downlink subframes on the centralized scheduling scheme can be more flexible and utilization is improved. However, existing interferences among the transmission of neighboring nodes lead to performance reduction of the network. In this paper, an efficient routing tree algorithm is proposed with combined uplink and downlink slot allocation on the centralized scheduling scheme which can abate interferences in the network. This algorithm allows more subscriber stations to transmit concurrently and so improves spatial reuse in the network. Also, the algorithm uses multi-channel and single channel systems and considers relay model, smoothing switching frequently between transmitting and receiving in successive time slots and fairness in the network. Extensive simulation results demonstrate the effectiveness of the proposed method in terms of scheduling length, link concurrency ratio, network throughput and Channel Utilization Ratio (CUR).展开更多
Improving routing algorithm performance not only leads to appreciate the quality of data transmission, but also increases the speed of data transfer. In this paper we propose a hybrid method which is a combination of ...Improving routing algorithm performance not only leads to appreciate the quality of data transmission, but also increases the speed of data transfer. In this paper we propose a hybrid method which is a combination of traffic classification by the help of colored pheromones and helping ants method in the intermediate nodes. This combination increases the convergence speed and decreases the delay and Jitter in the network. Also we compare the obtained results with two known routing algorithms that are based on the ant colony.展开更多
The technology of QoS routing has become a great challenge in Wireless Mesh Networks (WMNs). There exist a lot of literatures on QoS routing in WMNs, but the current algorithms have some deficiencies, such as high com...The technology of QoS routing has become a great challenge in Wireless Mesh Networks (WMNs). There exist a lot of literatures on QoS routing in WMNs, but the current algorithms have some deficiencies, such as high complexity, poor scalability and flexibility. To solve the problems above, a multipath routing algorithm based on traffic prediction (MRATP) is proposed in WMNs. MRATP consists of three modules including an algo-rithm on multipath routing built, a congestion discovery mechanism based on wavelet-neural network and a load balancing algorithm via multipath. Simulation results show that MRATP has some characteristics, such as better scalability, flexibility and robustness. Compared with the current algorithms, MRATP has higher success ratio, lower end to end delay and overhead. So MRATP can guarantee the end to end QoS of WMNs.展开更多
Wireless Mesh Network has drawn much attention due to wide area service coverage with low system cost and being easy to install.However,WMN suffers from high bit error rate,which provides different link capacity among...Wireless Mesh Network has drawn much attention due to wide area service coverage with low system cost and being easy to install.However,WMN suffers from high bit error rate,which provides different link capacity among wireless mesh routers.The conventional routing metrics select the path based on link quality.The link with the best quality is preferred as the data transmission path,and thus all nodes likely select the same link,which leads to network performance degradation.This paper proposes a routing metric that considers the available bandwidth and the number of nodes suffering congestion in the path.It is confirmed that the proposed method provides higher network performance of reduced delay,reduced packet loss and increased throughput than conventional routing metrics.展开更多
We analyze and summarize the literatures on secure routing protocols published since 2003.Firstly,threats and attacks on sensor network routing are sorted and summarized.Then the current secure routing protocols are a...We analyze and summarize the literatures on secure routing protocols published since 2003.Firstly,threats and attacks on sensor network routing are sorted and summarized.Then the current secure routing protocols are also classified.According to the taxonomy,some typical secure routing protocols are clarified particularly.Besides,the advantage and disadvantage of these secure routing protocols are compared and analyzed.Finally,we conclude this paper and prospect the future work.展开更多
Wireless Mesh Networks (WMNs) are vulnerable to various security threats because of their special infrastructure and communication mode, wherein insider attacks are the most challenging issue. To address this proble...Wireless Mesh Networks (WMNs) are vulnerable to various security threats because of their special infrastructure and communication mode, wherein insider attacks are the most challenging issue. To address this problem and protect innocent users from malicious attacks, it is important to encourage cooperation and deter malicious behaviors. Reputation systems constitute a major category of techniques used for managing trust in distributed networks, and they are effective in characterizing and quantifying a node's behavior for WMNs. However, conventional layered reputation mechanisms ignore several key factors of reputation in other layers; therefore, they cannot provide optimal performance and accurate malicious node identification and isolation for WMNs. In this paper, we propose a novel dynamic reputation mechanism, SLCRM, which couples reputation systems with a cross-layer design and node-security-rating classification techniques to dynamically detect and restrict insider attacks. Simulation results show that in terms of network throughput, packet delivery ratio, malicious nodes' identification, and success rates, SI_CRM imple- ments security protection against insider attacks in a more dynamic, effective, and efficient manner than the subjective logic and uncertainty-based reputation model and the familiarity-based reputation model.展开更多
Wireless Mesh Networks is vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, Lack of centralized monitoring and management point. The traditional way of protec...Wireless Mesh Networks is vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, Lack of centralized monitoring and management point. The traditional way of protecting networks with firewalls and encryption software is no longer suffi- cient and effective for those features. In this paper, we propose a distributed intrusion detection ap- proach based on timed automata. A cluster-based detection scheme is presented, where periodically a node is elected as the monitor node for a cluster. These monitor nodes can not only make local intrusion detection decisions, but also cooperatively take part in global intrusion detection. And then we con- struct the Finite State Machine (FSM) by the way of manually abstracting the correct behaviors of the node according to the routing protocol of Dynamic Source Routing (DSR). The monitor nodes can verify every node's behavior by the Finite State Ma- chine (FSM), and validly detect real-time attacks without signatures of intrusion or trained data.Compared with the architecture where each node is its own IDS agent, our approach is much more efficient while maintaining the same level of effectiveness. Finally, we evaluate the intrusion detection method through simulation experiments.展开更多
This paper focuses on investigating immunological principles in designing a multi-agent security architecture for intrusion detection and response in wireless mesh networks.In this approach,the immunity-based agents m...This paper focuses on investigating immunological principles in designing a multi-agent security architecture for intrusion detection and response in wireless mesh networks.In this approach,the immunity-based agents monitor the situation in the network.These agents can take appropriate actions according to the underlying security policies.Specifically,their activities are coordinated in a hierarchical fashion while sensing,communicating,determining and generating responses.Such an agent can learn about and adapt to its environment dynamically and can detect both known and unknown intrusions.The proposed intrusion detection architecture is designed to be flexible,extendible,and adaptable so that it can perform real-time monitoring.This paper provides the conceptual view and a general framework of the proposed system.In the end,the architecture is illustrated by an example and by simulation to show it can prevent attacks efficiently.展开更多
Intrusion is any unwanted activity that can disrupt the normal functions of wired or wireless networks. Wireless mesh networking technology has been pivotal in providing an affordable means to deploy a network and all...Intrusion is any unwanted activity that can disrupt the normal functions of wired or wireless networks. Wireless mesh networking technology has been pivotal in providing an affordable means to deploy a network and allow omnipresent access to users on the Internet. A multitude of emerging public services rely on the widespread, high-speed, and inexpensive connectivity provided by such networks. The absence of a centralized network infrastructure and open shared medium makes WMNs particularly susceptible to malevolent attacks, especially in multihop networks. Hence, it is becoming increasingly important to ensure privacy, security, and resilience when designing such networks. An effective method to detect possible internal and external attack vectors is to use an intrusion detection system. Although many Intrusion Detection Systems (IDSs) were proposed for Wireless Mesh Networks (WMNs), they can only detect intrusions in a particular layer. Because WMNs are vulnerable to multilayer security attacks, a cross-layer IDS are required to detect and respond to such attacks. In this study, we analyzed cross-layer IDS options in WMN environments. The main objective was to understand how such schemes detect security attacks at several OSI layers. The suggested IDS is verified in many scenarios, and the experimental results show its efficiency.展开更多
Due to their easy-to-deploy and self-healing features, WMNs (Wireless Mesh Networks) are emerging as a new promising technology with a rich set of applications. While the IEEE standardization of this new technology is...Due to their easy-to-deploy and self-healing features, WMNs (Wireless Mesh Networks) are emerging as a new promising technology with a rich set of applications. While the IEEE standardization of this new technology is still in progress, its main traits are already set, e.g., architecture and MAC routing. WMNs are attracting considerable research in academia and industry as well, but the lack of open-source testbeds is restricting such a research to simulation tools. The main problem with simulation tools is that they do not reflect the complexity of RF propagation, especially in indoor environments, of which IEEE 802.11s WMNs are an example. This paper presents an open-source implementation of an indoor IEEE 802.11s WMN testbed. The implementation is transparent, easy-to-deploy, and both the source code and deployment instructions are available online. The implementation can serve as a blueprint for the WMN research community to deploy their own testbeds, negating the shortcomings of using simulation tools. By delving into the testbed implementation subtleties, this paper is shedding further light on the details of the ongoing IEEE 802.11s standard. Major encountered implementation problems (e.g., clients association, Internetworking, and supporting multiple gateways) are identified and addressed. To ascertain the functionality of the testbed, both UDP and TCP traffic are supported and operational. The testbed uses the default IEEE 802.11s HWMP (Hybrid Wireless Mesh Protocol) routing protocol along with the default IEEE 802.11s Airtime routing metric.展开更多
Wireless mesh networks (WMNs) are new kind of networking technology which facilitate the extension of wireless local area networks into wide areas and have emerged as a key technology for next-generation wireless netw...Wireless mesh networks (WMNs) are new kind of networking technology which facilitate the extension of wireless local area networks into wide areas and have emerged as a key technology for next-generation wireless networking.Due to the advantages of WMNs over other wireless networks,they are now a promising approach for future network access.Typical applications range from home broadband Internet access and community networking to wireless metropolitan area networks.Meanwhile,the considerable efforts in academic range from network architecture,network capacity,layered communication protocols,security,cross-layer design,etc.Still many technical challenges exist in designing affordable,reliable,and sustainable WMNs infrastructures.In order to provide a better understanding of these challenges,this paper presents a detailed investigation of current technologies for WMNs,and it will help to guide and refocus future works in this area.展开更多
In this paper, we present a Micro-payment based Isolation of Misbehavior(MIM) secure routing protocol. The protocol contains three parts: micro-payment scheme, routingdiscovery and malicious nodes detection The micro-...In this paper, we present a Micro-payment based Isolation of Misbehavior(MIM) secure routing protocol. The protocol contains three parts: micro-payment scheme, routingdiscovery and malicious nodes detection The micro-payment scheme proposed in MIM is the firstvirtual currency system that can be suit lor sensor network environment, Based on the micro-paymentscheme, we device an energy aware routing protocol, which forwards packets by auction. Furthermore,the base station can detect and isolate misbehave or non-cooptrare nodes according to the routinginformation.展开更多
This study proposes an efficient secure routing protocol which considers symmetric and asymmetric links for wireless mesh networks(WMNs). A wireless mesh network is a group of wireless mesh routers and several kinds o...This study proposes an efficient secure routing protocol which considers symmetric and asymmetric links for wireless mesh networks(WMNs). A wireless mesh network is a group of wireless mesh routers and several kinds of wireless devices(or nodes). Individual node cooperates by forwarding packets to each other,allowing nodes to communicate beyond the symmetric or asymmetric links. Asymmetric link is a special feature of WMNs because the wireless transmission ranges of different wireless devices may be different. The asymmetric link enhances WMN coverage. Providing security in WMNs has become an important issue over the last few years. Existing research on this topic tends to focus on providing security for routing and data content in the symmetric link. However, most studies overlook the asymmetric link in these networks. This study proposes a novel distributed routing protocol beyond symmetric and asymmetric links, to guarantee the security and high reliability of the established route in a hostile environment, such as WMNs, by avoiding the use of unreliable intermediate nodes. The routes generated by the proposed protocol are shorter than those in prior works. The major objective of the proposed protocol is to allow trustworthy intermediate nodes to participate in the path construction protocol. The mesh clients out of mesh router wireless transmission range may discover a secure route to securely connect to the mesh router for Internet access via the proposed protocol. The proposed protocol enhances wireless mesh network coverage and assures security.展开更多
基金This work was supported in part by the National Natural Science Foundation of China (61172051, 61071124), the Fok Ying Tung Education Foundation (121065), the Program for New Century Excellent Talents in University (11-0075), the Fundamental Research Funds for the Central Universities (N110204001, N110604008), and the Specialized Research Fund for the Doctoral Program of Higher Education (20110042110023, 20110042120035).
文摘This paper proposes a new Energyefficient Survivable Routing Protocol(ESRP)based on solar energy and wind mixed for power supply in green wireless mesh networks(WMNs).The ESRP combines hop penalty strategy and flooding delaying strategy to improve the performances of traditional routing protocol.This paper uses QualNet to simulate and verify the performances of proposed ESRP.Compared with the traditional routing protocol,the simulation results show that the energy utilization of ESRP is more efficient by 13%.At the same time,ESRP is more load-balanced to postpone the appearance of the first energy depletion node and reduce the number of energy depletion nodes,and thus it effectively improves network survivability.
基金Supported by the National High Technology Research and Development Program (No. 2009AA011504)
文摘Cognitive Wireless Mesh Networks(CWMN) is a novel wireless network which combines the advantage of Cognitive Radio(CR) and wireless mesh networks.CWMN can realize seamless in-tegration of heterogeneous wireless networks and achieve better radio resource utilization.However,it is particularly vulnerable due to its features of open medium,dynamic spectrum,dynamic topology,and multi-top routing,etc..Being a dynamic positive security strategy,intrusion detection can provide powerful safeguard to CWMN.In this paper,we introduce trust mechanism into CWMN with intrusion detection and present a trust establishment model based on intrusion detection.Node trust degree and the trust degree of data transmission channels between nodes are defined and an algorithm of calcu-lating trust degree is given based on distributed detection of attack to networks.A channel assignment and routing scheme is proposed,in which selects the trusted nodes and allocates data channel with high trust degree for the transmission between neighbor nodes to establish a trusted route.Simulation re-sults indicate that the scheme can vary channel allocation and routing dynamically according to network security state so as to avoid suspect nodes and unsafe channels,and improve the packet safe delivery fraction effectively.
文摘This paper provides a deep evaluation of the energy consumption of routing protocols. The evaluation is done along with other metrics such as throughput and packet delivery ratio (PDR). We introduce two more metrics to capture the efficiency of the energy consumption: e-throughput and e-PDR. Both are ratios in relation to the energy. We consider the three low layers of the stack. Three types of routing protocols are used: proactive, reactive, and hybrid. At the MAC and PHY layer, three radio types are considered: 802.11a/b/g. Finally, the number of nodes is varying in random topologies, with nodes being static or mobile. Simulations are conducted using NS3. The parameters of a real network interface card are used. From the results in mobile position scenarios, no protocol is outperforming the others;even if OLSR has the lowest energy consumption, most of the time. However, in constant position scenarios, AODV consumed a lower energy, apart from the scenarios using the 802.11a standard where HWMP energy consumption is the lowest. Regarding the energy efficiency, AODV protocols provided the best e-throughput and OLSR the best e-PDR in overall configurations. A framework for selecting energy-efficient routing protocol depending on network characteristics is proposed at the end.
基金This project was supported by the National Natural Science Foundation of China (60573129).
文摘Communication security is a critical aspect of QoS provisioning in wireless mesh network (WMN). Because of the inherent characteristics of WMN, conventional security mechanisms cannot be applied. In order to guarantee the communication security, a novel communication security mechanism is proposed. The mechanism uses a communication encryption scheme to encrypt data packets and employs a risk avoidance scheme to avoid the malicious nodes during communications. Simulation results indicate that the mechanism is able to provide secure communication effectively and reduce the damage of attacks through multiple paths.
文摘Wireless sensor networks (WSNs) consist of a large number of sensor nodes that monitor the environment and a few base stations that collect the sensor readings. Individual sensor nodes are subject to compromised security because they may be deployed in hostile environments and each sensor node communicates wirelessly. An adversary can inject false reports into the networks via compromised nodes. Furthermore, an adversary can create a wormhole by directly linking two compromised nodes or using out-of-band channels. If these two kinds of attacks occur simultaneously in a network, existing methods cannot defend against them adequately. We thus propose a secure routing method for detecting false report injections and wormhole attacks in wireless sensor networks. The proposed method uses ACK messages for detecting wormholes and is based on a statistical en-route filtering (SEF) scheme for detecting false reports. Simulation results show that the proposed method reduces energy consumption by up to 20% and provide greater network security.
基金supported by the Fundamental Research Funds for the Central Universities under Grant No.ZYGX2009j006Foundation of Science & Technology Department of Sichuan Province under Grant No.2011GZ0192
文摘A proactive routing protocol CL-OLSR (cross-layer based optimized link state routing) by using a brand-new routing metric CLM (cross-layer metric) is proposed. CL-OLSR takes into account four link quality impact factors in route calculation through the cross-layer operation mechanism: the node available bandwidth, the node load, the link delivery rate, and the link interference, and thus the effect of route selection is optimized greatly. The simulation results show that the proposed CL-OLSR protocol can not only improve the network throughput to a large extent, but also reduce the end-to-end delay, while achieving load balance route results.
基金supported in part by National Natural Science Foundation of China(Grant Nos.61302071,61471109,61502075)Fundamental Research Funds for the Central Universities(Grant Nos.N150404015,DUT15QY06,DUT15RC(3)009)+2 种基金China Postdoctoral Science Foundation Funded Project(Grant No.2015M580224)Liaoning Province Doctor Startup Fund(Grant No.201501166)State Key Laboratory for Novel Software Technology,Nanjing University(Grant No.KFKT2015B12)
文摘As an extension of wireless ad hoc and sensor networks, wireless mesh networks(WMNs) are employed as an emerging key solution for wireless broadband connectivity improvement. Due to the lack of physical security guarantees, WMNs are susceptible to various kinds of attack. In this paper, we focus on node social selfish attack, which decreases network performance significantly. Since this type of attack is not obvious to detect, we propose a security routing scheme based on social network and reputation evaluation to solve this attack issue. First, we present a dynamic reputation model to evaluate a node's routing behavior, from which we can identify selfish attacks and selfish nodes. Furthermore, a social characteristic evaluation model is studied to evaluate the social relationship among nodes. Groups are built based on the similarity of node social status and we can get a secure routing based on these social groups of nodes. In addition, in our scheme, nodes are encouraged to enter into multiple groups and friend nodes are recommended to join into groups to reduce the possibility of isolated nodes. Simulation results demonstrate that our scheme is able to reflect node security status, and routings are chosen and adjusted according to security status timely and accurately so that the safety and reliability of routing are improved.
文摘IEEE 802.16 mesh mode defines routing tree for transmitting data in centralized scheduling but it does not define any explicit proposal for combining uplink and downlink subframes. Deploying combined uplink and downlink subframes on the centralized scheduling scheme can be more flexible and utilization is improved. However, existing interferences among the transmission of neighboring nodes lead to performance reduction of the network. In this paper, an efficient routing tree algorithm is proposed with combined uplink and downlink slot allocation on the centralized scheduling scheme which can abate interferences in the network. This algorithm allows more subscriber stations to transmit concurrently and so improves spatial reuse in the network. Also, the algorithm uses multi-channel and single channel systems and considers relay model, smoothing switching frequently between transmitting and receiving in successive time slots and fairness in the network. Extensive simulation results demonstrate the effectiveness of the proposed method in terms of scheduling length, link concurrency ratio, network throughput and Channel Utilization Ratio (CUR).
文摘Improving routing algorithm performance not only leads to appreciate the quality of data transmission, but also increases the speed of data transfer. In this paper we propose a hybrid method which is a combination of traffic classification by the help of colored pheromones and helping ants method in the intermediate nodes. This combination increases the convergence speed and decreases the delay and Jitter in the network. Also we compare the obtained results with two known routing algorithms that are based on the ant colony.
文摘The technology of QoS routing has become a great challenge in Wireless Mesh Networks (WMNs). There exist a lot of literatures on QoS routing in WMNs, but the current algorithms have some deficiencies, such as high complexity, poor scalability and flexibility. To solve the problems above, a multipath routing algorithm based on traffic prediction (MRATP) is proposed in WMNs. MRATP consists of three modules including an algo-rithm on multipath routing built, a congestion discovery mechanism based on wavelet-neural network and a load balancing algorithm via multipath. Simulation results show that MRATP has some characteristics, such as better scalability, flexibility and robustness. Compared with the current algorithms, MRATP has higher success ratio, lower end to end delay and overhead. So MRATP can guarantee the end to end QoS of WMNs.
基金supported by the ubiquitous Computing and Network(UCN)Projectthe Ministry of Knowledge and Econ-omy(MKE)Knowledge and Economy Frontier R&DProgramin Korea as a result of UCN′s subproject10C2-C1-20Ssupported by the MKE(The Ministry of Knowledge Economy),Korea,under the Convergence-ITRC(Convergence Infor mation Technology Research Center)support program(NIPA-2011-C6150-1101-0004)
文摘Wireless Mesh Network has drawn much attention due to wide area service coverage with low system cost and being easy to install.However,WMN suffers from high bit error rate,which provides different link capacity among wireless mesh routers.The conventional routing metrics select the path based on link quality.The link with the best quality is preferred as the data transmission path,and thus all nodes likely select the same link,which leads to network performance degradation.This paper proposes a routing metric that considers the available bandwidth and the number of nodes suffering congestion in the path.It is confirmed that the proposed method provides higher network performance of reduced delay,reduced packet loss and increased throughput than conventional routing metrics.
基金supported by the National Natural Science Foundation of China(No. 60573141, 60773041)National High Technology Research and Devel-opment Program of China(863 Program) (No. 2006AA01Z201, 2006AA01Z219, 2007AA01Z404, 2007AA01 Z478)the Provincial Jiangsu High Technology Research Program(No. BG2006001)
文摘We analyze and summarize the literatures on secure routing protocols published since 2003.Firstly,threats and attacks on sensor network routing are sorted and summarized.Then the current secure routing protocols are also classified.According to the taxonomy,some typical secure routing protocols are clarified particularly.Besides,the advantage and disadvantage of these secure routing protocols are compared and analyzed.Finally,we conclude this paper and prospect the future work.
基金supported by the Program for Changjiang Scholars and Innovative Research Team in University under Grant No.IRT1078the Key Program of NSFC-Guangdong Union Foundation under Grant No.U1135002+1 种基金Major National S&T Program under Grant No.2011ZX03005-002the Fundamental Research Funds for the Central Universities under Grant No.JY10000903001
文摘Wireless Mesh Networks (WMNs) are vulnerable to various security threats because of their special infrastructure and communication mode, wherein insider attacks are the most challenging issue. To address this problem and protect innocent users from malicious attacks, it is important to encourage cooperation and deter malicious behaviors. Reputation systems constitute a major category of techniques used for managing trust in distributed networks, and they are effective in characterizing and quantifying a node's behavior for WMNs. However, conventional layered reputation mechanisms ignore several key factors of reputation in other layers; therefore, they cannot provide optimal performance and accurate malicious node identification and isolation for WMNs. In this paper, we propose a novel dynamic reputation mechanism, SLCRM, which couples reputation systems with a cross-layer design and node-security-rating classification techniques to dynamically detect and restrict insider attacks. Simulation results show that in terms of network throughput, packet delivery ratio, malicious nodes' identification, and success rates, SI_CRM imple- ments security protection against insider attacks in a more dynamic, effective, and efficient manner than the subjective logic and uncertainty-based reputation model and the familiarity-based reputation model.
基金Acknowledgements Project supported by the National Natural Science Foundation of China (Grant No.60932003), the National High Technology Development 863 Program of China (Grant No.2007AA01Z452, No. 2009AA01 Z118 ), Project supported by Shanghai Municipal Natural Science Foundation (Grant No.09ZRI414900), National Undergraduate Innovative Test Program (091024812).
文摘Wireless Mesh Networks is vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, Lack of centralized monitoring and management point. The traditional way of protecting networks with firewalls and encryption software is no longer suffi- cient and effective for those features. In this paper, we propose a distributed intrusion detection ap- proach based on timed automata. A cluster-based detection scheme is presented, where periodically a node is elected as the monitor node for a cluster. These monitor nodes can not only make local intrusion detection decisions, but also cooperatively take part in global intrusion detection. And then we con- struct the Finite State Machine (FSM) by the way of manually abstracting the correct behaviors of the node according to the routing protocol of Dynamic Source Routing (DSR). The monitor nodes can verify every node's behavior by the Finite State Ma- chine (FSM), and validly detect real-time attacks without signatures of intrusion or trained data.Compared with the architecture where each node is its own IDS agent, our approach is much more efficient while maintaining the same level of effectiveness. Finally, we evaluate the intrusion detection method through simulation experiments.
基金supported by National Natural Science Foundation of China under Grant No.60932003National High Technical Research and Development Program of China(863 program) Grant No.2007AA01Z452,No.2009AA01Z118+1 种基金Shanghai Municipal Natural Science Foundation under Grant No.09ZR1414900National Undergraduate Innovative Test Program under Grant No.091024812
文摘This paper focuses on investigating immunological principles in designing a multi-agent security architecture for intrusion detection and response in wireless mesh networks.In this approach,the immunity-based agents monitor the situation in the network.These agents can take appropriate actions according to the underlying security policies.Specifically,their activities are coordinated in a hierarchical fashion while sensing,communicating,determining and generating responses.Such an agent can learn about and adapt to its environment dynamically and can detect both known and unknown intrusions.The proposed intrusion detection architecture is designed to be flexible,extendible,and adaptable so that it can perform real-time monitoring.This paper provides the conceptual view and a general framework of the proposed system.In the end,the architecture is illustrated by an example and by simulation to show it can prevent attacks efficiently.
文摘Intrusion is any unwanted activity that can disrupt the normal functions of wired or wireless networks. Wireless mesh networking technology has been pivotal in providing an affordable means to deploy a network and allow omnipresent access to users on the Internet. A multitude of emerging public services rely on the widespread, high-speed, and inexpensive connectivity provided by such networks. The absence of a centralized network infrastructure and open shared medium makes WMNs particularly susceptible to malevolent attacks, especially in multihop networks. Hence, it is becoming increasingly important to ensure privacy, security, and resilience when designing such networks. An effective method to detect possible internal and external attack vectors is to use an intrusion detection system. Although many Intrusion Detection Systems (IDSs) were proposed for Wireless Mesh Networks (WMNs), they can only detect intrusions in a particular layer. Because WMNs are vulnerable to multilayer security attacks, a cross-layer IDS are required to detect and respond to such attacks. In this study, we analyzed cross-layer IDS options in WMN environments. The main objective was to understand how such schemes detect security attacks at several OSI layers. The suggested IDS is verified in many scenarios, and the experimental results show its efficiency.
文摘Due to their easy-to-deploy and self-healing features, WMNs (Wireless Mesh Networks) are emerging as a new promising technology with a rich set of applications. While the IEEE standardization of this new technology is still in progress, its main traits are already set, e.g., architecture and MAC routing. WMNs are attracting considerable research in academia and industry as well, but the lack of open-source testbeds is restricting such a research to simulation tools. The main problem with simulation tools is that they do not reflect the complexity of RF propagation, especially in indoor environments, of which IEEE 802.11s WMNs are an example. This paper presents an open-source implementation of an indoor IEEE 802.11s WMN testbed. The implementation is transparent, easy-to-deploy, and both the source code and deployment instructions are available online. The implementation can serve as a blueprint for the WMN research community to deploy their own testbeds, negating the shortcomings of using simulation tools. By delving into the testbed implementation subtleties, this paper is shedding further light on the details of the ongoing IEEE 802.11s standard. Major encountered implementation problems (e.g., clients association, Internetworking, and supporting multiple gateways) are identified and addressed. To ascertain the functionality of the testbed, both UDP and TCP traffic are supported and operational. The testbed uses the default IEEE 802.11s HWMP (Hybrid Wireless Mesh Protocol) routing protocol along with the default IEEE 802.11s Airtime routing metric.
基金supported in part by the National High Technology Research and Development Program of China (863 Program) (No. 2006AA01Z232,2009AA01Z212, 2009AA01Z202)Key Science and Technology Supporting Plan Item of Jiangsu Province(No. BE2008134)Special Fund of Trans-formation of Scientific and Technological Achievements of Jiangsu Province(No. BA2007012)
文摘Wireless mesh networks (WMNs) are new kind of networking technology which facilitate the extension of wireless local area networks into wide areas and have emerged as a key technology for next-generation wireless networking.Due to the advantages of WMNs over other wireless networks,they are now a promising approach for future network access.Typical applications range from home broadband Internet access and community networking to wireless metropolitan area networks.Meanwhile,the considerable efforts in academic range from network architecture,network capacity,layered communication protocols,security,cross-layer design,etc.Still many technical challenges exist in designing affordable,reliable,and sustainable WMNs infrastructures.In order to provide a better understanding of these challenges,this paper presents a detailed investigation of current technologies for WMNs,and it will help to guide and refocus future works in this area.
文摘In this paper, we present a Micro-payment based Isolation of Misbehavior(MIM) secure routing protocol. The protocol contains three parts: micro-payment scheme, routingdiscovery and malicious nodes detection The micro-payment scheme proposed in MIM is the firstvirtual currency system that can be suit lor sensor network environment, Based on the micro-paymentscheme, we device an energy aware routing protocol, which forwards packets by auction. Furthermore,the base station can detect and isolate misbehave or non-cooptrare nodes according to the routinginformation.
文摘This study proposes an efficient secure routing protocol which considers symmetric and asymmetric links for wireless mesh networks(WMNs). A wireless mesh network is a group of wireless mesh routers and several kinds of wireless devices(or nodes). Individual node cooperates by forwarding packets to each other,allowing nodes to communicate beyond the symmetric or asymmetric links. Asymmetric link is a special feature of WMNs because the wireless transmission ranges of different wireless devices may be different. The asymmetric link enhances WMN coverage. Providing security in WMNs has become an important issue over the last few years. Existing research on this topic tends to focus on providing security for routing and data content in the symmetric link. However, most studies overlook the asymmetric link in these networks. This study proposes a novel distributed routing protocol beyond symmetric and asymmetric links, to guarantee the security and high reliability of the established route in a hostile environment, such as WMNs, by avoiding the use of unreliable intermediate nodes. The routes generated by the proposed protocol are shorter than those in prior works. The major objective of the proposed protocol is to allow trustworthy intermediate nodes to participate in the path construction protocol. The mesh clients out of mesh router wireless transmission range may discover a secure route to securely connect to the mesh router for Internet access via the proposed protocol. The proposed protocol enhances wireless mesh network coverage and assures security.