Lin, Hui and Hu, Jia and Xu, Li and Tian, Youliang and Liu, Lei and Blakeway, Stewart (2016) A Trustworthy and Energy-Aware Routing Protocol in Software-Defined Wireless Mesh Networks. Computers and Electrical Engineering. ISSN 0045-7906
Preview |
Text
A Trustworthy and Energy-Aware Routing Protocol final-lin-10-27-2.pdf - Accepted Version Download (2MB) | Preview |
Abstract
Hybrid Wireless Mesh Networks (HWMNs) were proposed to address the challenges in wireless communications to support mobile applications across different domains. Due to the multi-hop and decentralized network architecture, HWMNs are naturally susceptible to various security threats, especially internal attacks.
Therefore, HWMNs must be able to detect anomalies, provide secure routing and protect user privacy through the cooperation among nodes. However, the existing routing protocols for HWMNs cannot ensure the security to protect the users privacy effectively. Moreover, traditional HWMNs are vertically integrated where the control and data planes of mesh routers are bundled together, which makes it complex and difficult to configure the network according to predefined security policies, and to adaptively respond to various dynamic security threats.
Software-Defined Wireless Mesh Networks decouple the control plane and data plane of routers and thus enable a more flexible and efficient configuration of security policies. Taking up this opportunity to address the aforementioned challenges, this paper proposes a privacy-aware, secure and energy-aware green routing (PSGR)
protocol that can defend against internal attacks, achieve stronger privacy protection and reduce energy consumption in Software-Defined HWMNs. The elaborate theoretical analysis verify that the PSGR protocol can implement the security and privacy protection against internal attacks effectively and efficiently. Simulation results demonstrate a superior performance of PSGR in terms of packet delivery ratio, network throughput and energy efficiency compared to the existing PA-SHWMP, PASER, and HWMP protocols in the presence of Blackhole/Grayhole attacks and wormhole attacks.
Item Type: | Article |
---|---|
Additional Information and Comments: | “NOTICE: this is the author’s version of a work that was accepted for publication in Computers & Electrical Engineering". Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Computers & Electrical Engineering at https://doi.org/10.1016/j.compeleceng.2016.10.015 |
Faculty / Department: | Faculty of Human and Digital Sciences > Mathematics and Computer Science |
Depositing User: | Stewart Blakeway |
Date Deposited: | 06 Jun 2017 10:13 |
Last Modified: | 12 Dec 2018 01:15 |
URI: | https://hira.hope.ac.uk/id/eprint/1755 |
Actions (login required)
View Item |