CFP last date
20 January 2025
Reseach Article

A Survey of Secure Routing Protocols for Wireless Mesh Networks

by Thillaikarasi, Mary Saira Bhanu
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 97 - Number 6
Year of Publication: 2014
Authors: Thillaikarasi, Mary Saira Bhanu
10.5120/17008-7208

Thillaikarasi, Mary Saira Bhanu . A Survey of Secure Routing Protocols for Wireless Mesh Networks. International Journal of Computer Applications. 97, 6 ( July 2014), 1-8. DOI=10.5120/17008-7208

@article{ 10.5120/17008-7208,
author = { Thillaikarasi, Mary Saira Bhanu },
title = { A Survey of Secure Routing Protocols for Wireless Mesh Networks },
journal = { International Journal of Computer Applications },
issue_date = { July 2014 },
volume = { 97 },
number = { 6 },
month = { July },
year = { 2014 },
issn = { 0975-8887 },
pages = { 1-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume97/number6/17008-7208/ },
doi = { 10.5120/17008-7208 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:23:22.408808+05:30
%A Thillaikarasi
%A Mary Saira Bhanu
%T A Survey of Secure Routing Protocols for Wireless Mesh Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 97
%N 6
%P 1-8
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless mesh network (WMN) is the subsequent pace in the development of wireless architecture which provides wireless internet connectivity in an extensive topographical area. Key advantages of WMNs include simple installation, low cost, self-connectivity of nodes, network flexibility and discovery of newly added nodes. WMN is used to integrate different types of networks such as the Internet, cellular, Wi-Fi networks, Wi-Max, sensor networks, etc. The Gateway and bridging functions of the mesh routers enable them to form a hybrid network. In WMN, security is a major challenging issue due to its physical channel vulnerability, dynamic change of the topology etc. , which necessitates extensive research to design new security protocols for all layers from physical layer to application layer of the protocol stack. Network layer attacks have paramount significance since they may lead to paralyzing a larger scale network services. The major issue in providing seamless services in WMNs is the design of a secure routing protocol. This paper presents a thorough survey of different secure routing protocols for WMN.

References
  1. Xiang Xu, Xianjie Wu, Zhi Yu. 2010. Application of Wireless Mesh Network in Campus Network. Second International Conference on Communication systems Networks and applications. pp. 245-247.
  2. Amandeep Jindal, Anil Gankotiya, Sahil Seth. 2010. A Comparative Study between Wireless Local Area Networks and Wireless Mesh Networks. Second International Conference on Computer Engineering and Applications. vol. 1, pp. 192-196.
  3. Anil Kumar Gankotiya1, Gurdit Sing, SahilSeth2. Attacks and their Counter Measures in Wireless Mesh Networks. Available: htttp://www. csjournals. com/IJITKM/Special.
  4. Akyildiz, IF, Wang, X and W. Wang. (2005, March). Wireless Mesh Network: A Survey. In Computer Networks and ISDN Systems. Volume 47(4). pp. 445-487.
  5. C. Perkins, E. Belding-Royer and S. Das. (2003 July). Ad hoc On demand Distance Vector (AODV) Routing. IETF RFC 3561.
  6. E Cizeron, J. P. Guédon, S. Hamma and H. Issaka. (2006 Oct). Performance Evaluation of Reactive and Proactive Routing Protocol in IEEE 802. 11 Ad hoc Network. In the proceedings of SPIE Next-Generation Communication and Sensor Networks, Volume 6387,
  7. J. Broch, D. A. Maltz, D. B. Johnson, Y-C. Hu, and J. Jetcheva. (1998 Oct). A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. In the proceedings of the Fourth Annual International Conference on Mobile Computing and Networking (MobiCom'98). pp: 85-97.
  8. Yi, S, Naldurg, P and Kravets, R, (2001). Security-aware ad hoc routing for wireless networks. Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'01), Long Beach, CL, USA, (299 – 302).
  9. P. Papadimitratos and Z. J. Haas. (2002 Jan). Secure routing for mobile ad hoc networks. In Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS'02), San Antonio, TX, USA, pp. 27-31.
  10. Y. -C. Hu, D. B. Johnson, and A. Perrig. (2002 June). SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. In Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA'02), Callicoon, NY, USA, pp. 3 – 13.
  11. M. G. Zapata and N. Asokan. (2002 Sep). Securing ad hoc routing protocols. In Proceedings of the 1st ACM Workshop on Wireless Security (WiSe'02), Atlanta, GA, USA, pp. 1-10.
  12. Y. -C. Hu, A, Perrig, and D. Johnson. (2002 Sep). Ariadne: a secure on-demand routing protocol for adhoc networks. In Proceedings of ACM Annual International Conference on Mobile Computing (MobiCom'02), pp. 21 – 38, Atlanta, GA, USA.
  13. K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer. (2002 Nov). A secure routing protocol for ad hoc networks. In Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP'02), Paris, France, pp. 78 – 87.
  14. P. Papadimitratos and Z. J. Hass. 2003. Secure link state routing for mobile ad hoc networks. In Proceedings of the Symposium on Applications and the Internet Workshops (SAINT'03 Workshops), pp. 379-383, Washington DC, USA,
  15. C. Li, Z. Wang, and C. Yang. (2011 Sep). Secure routing for wireless mesh networks. International Journal of Network Security, vol 13, no 2, pp. 109-120,
  16. Rakesh Matam and Somanath Tripathy. (2014 May). Provably Secure Routing Protocol for Wireless Mesh Networks. International Journal of Network Security, vol 16(3), pp. 168-178.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Mesh Networks Security Routing Algorithms