Next Article in Journal
Oriented Immobilization of His-Tagged Protein on a Redox Active Thiol Derivative of DPTA-Cu(II) Layer Deposited on a Gold Electrode—The Base of Electrochemical Biosensors
Previous Article in Journal
Research on the Dynamic Hysteresis Loop Model of the Residence Times Difference (RTD)-Fluxgate
Sensors 2013, 13(9), 11553-11585; doi:10.3390/s130911553
Article

A Security Analysis of the 802.11s Wireless Mesh Network Routing Protocol and Its Secure Routing Protocols

1
, 1,* , 1
 and 2
Received: 13 February 2013; in revised form: 15 August 2013 / Accepted: 29 August 2013 / Published: 2 September 2013
(This article belongs to the Section Physical Sensors)
View Full-Text   |   Download PDF [502 KB, updated 21 June 2014; original version uploaded 21 June 2014]   |   Browse Figures
Abstract: Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.
Keywords: hybrid wireless mesh protocol; secure routing; wireless mesh network; 802.11s; sensor network hybrid wireless mesh protocol; secure routing; wireless mesh network; 802.11s; sensor network
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Export to BibTeX |
EndNote


MDPI and ACS Style

Tan, W.K.; Lee, S.-G.; Lam, J.H.; Yoo, S.-M. A Security Analysis of the 802.11s Wireless Mesh Network Routing Protocol and Its Secure Routing Protocols. Sensors 2013, 13, 11553-11585.

AMA Style

Tan WK, Lee S-G, Lam JH, Yoo S-M. A Security Analysis of the 802.11s Wireless Mesh Network Routing Protocol and Its Secure Routing Protocols. Sensors. 2013; 13(9):11553-11585.

Chicago/Turabian Style

Tan, Whye K.; Lee, Sang-Gon; Lam, Jun H.; Yoo, Seong-Moo. 2013. "A Security Analysis of the 802.11s Wireless Mesh Network Routing Protocol and Its Secure Routing Protocols." Sensors 13, no. 9: 11553-11585.


Sensors EISSN 1424-8220 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert