Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2016, Article ID 4853924, 19 pages
http://dx.doi.org/10.1155/2016/4853924
Research Article

Analysis of Denial of Service Impact on Data Routing in Mobile eHealth Wireless Mesh Network

1Center of Excellence in Information Assurance (CoEIA), King Saud University, Riyadh 12372, Saudi Arabia
2College of Computer & Information Sciences, King Saud University, Riyadh 12372, Saudi Arabia

Received 12 January 2016; Accepted 8 June 2016

Academic Editor: Laurence T. Yang

Copyright © 2016 Shaker Alanazi et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. I. F. Akyildiz, X. Wang, and W. Wang, “Wireless mesh networks: a survey,” Computer Networks, vol. 47, no. 4, pp. 445–487, 2005. View at Publisher · View at Google Scholar · View at Scopus
  2. P. H. Pathak and R. Dutta, “A survey of network design problems and joint design approaches in wireless mesh networks,” IEEE Communications Surveys & Tutorials, vol. 13, no. 3, pp. 396–428, 2011. View at Publisher · View at Google Scholar · View at Scopus
  3. S. D. Odabasi and A. H. Zaim, “A survey on wireless mesh networks, routing metrics and protocols,” International Journal of Electronics, Mechanical and Mechatronics Engineering, vol. 2, no. 1, pp. 92–104, 2010. View at Google Scholar
  4. C.-W. Lee, “Security in wireless mesh networks,” in Wireless Network Security, pp. 229–246, Springer, Berlin, Germany, 2013. View at Google Scholar
  5. R. Matam and S. Tripathy, “WRSR: wormhole-resistant secure routing for wireless mesh networks,” EURASIP Journal on Wireless Communications and Networking, vol. 2013, no. 1, article 180, 2013. View at Publisher · View at Google Scholar · View at Scopus
  6. Z. You and Y. Wang, “An efficient and secure routing protocol for a hybrid wireless mesh network,” Journal of Computational Information Systems, vol. 8, no. 21, pp. 8693–8705, 2012. View at Google Scholar · View at Scopus
  7. S. Khan and J. Loo, “Cross layer secure and resource-aware on-demand routing protocol for hybrid wireless mesh networks,” Wireless Personal Communications, vol. 62, no. 1, pp. 201–214, 2012. View at Publisher · View at Google Scholar · View at Scopus
  8. S. Khan, N. A. Alrajeh, and K.-K. Loo, “Secure route selection in wireless mesh networks,” Computer Networks, vol. 56, no. 2, pp. 491–503, 2012. View at Publisher · View at Google Scholar · View at Scopus
  9. D. Benetti, M. Merro, and L. Viganò, “Model checking ad hoc network routing protocols: ARAN vs. endair A,” in Proceedings of the 8th IEEE International Conference on Software Engineering and Formal Methods (SEFM '10), pp. 191–202, September 2010. View at Publisher · View at Google Scholar · View at Scopus
  10. S. Lu, L. Li, K.-Y. Lam, and L. Jia, “SAODV: a MANET routing protocol that can withstand black hole attack,” in Proceedings of the International Conference on Computational Intelligence and Security (CIS '09), pp. 421–425, Beijing, China, December 2009. View at Publisher · View at Google Scholar · View at Scopus
  11. C. H. Lin, W. S. Lai, Y. L. Huang, and M. Chou, “I-SEAD: a secure routing protocol for mobile Ad Hoc networks,” Multimedia and Ubiquitous Engineering, vol. 1, no. 1, pp. 102–107, 2008. View at Google Scholar
  12. M. O. Pervaiz, M. Cardei, and J. Wu, “Routing security in Ad Hoc wireless networks,” Network Security, pp. 117–142, 2010. View at Publisher · View at Google Scholar · View at Scopus
  13. K. Graffi, P. S. Mogre, M. Hollick, and R. Steinmetz, “Detection of colluding misbehaving nodes in mobile ad hoc and wireless mesh networks,” in Proceedings of the 50th Annual IEEE Global Telecommunications Conference (GLOBECOM '07), pp. 5097–5101, Washington, DC, USA, November 2007. View at Publisher · View at Google Scholar · View at Scopus
  14. S. Madria and J. Yin, “SeRWA: a secure routing protocol against wormhole attacks in sensor networks,” Ad Hoc Networks, vol. 7, no. 6, pp. 1051–1063, 2009. View at Publisher · View at Google Scholar · View at Scopus
  15. H.-M. Sun, C.-H. Chen, C.-W. Yeh, and Y.-H. Chen, “A collaborative routing protocol against routing disruptions in MANETs,” Personal and Ubiquitous Computing, vol. 17, no. 5, pp. 865–874, 2013. View at Publisher · View at Google Scholar · View at Scopus
  16. M. Sbeiti, A. Wolff, and C. Wietfeld, “PASER: Position aware secure and efficient route discovery protocol forwireless mesh networks,” in Proceedings of the 5th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE '11), pp. 63–70, Saint Laurent du Var, France, August 2011. View at Scopus
  17. A. Sgora, D. D. Vergados, and P. Chatzimisios, “A survey on security and privacy issues in wireless mesh networks,” Security and Communication Networks, 2013. View at Publisher · View at Google Scholar
  18. J. Sen, “Security and privacy issues in wireless mesh networks: a survey,” in Wireless Networks and Security, Signals and Communication Technology, pp. 189–272, Springer, Berlin, Germany, 2013. View at Publisher · View at Google Scholar
  19. S. Alanazi, J. Al-Muhtadi, A. Derhab et al., “On resilience of Wireless Mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications,” in Proceedings of the 17th International Conference on E-Health Networking, Application & Services (HealthCom '15), pp. 205–210, IEEE, Boston, Mass, USA, October 2015. View at Publisher · View at Google Scholar
  20. S. M. S. Bari, F. Anwar, and M. H. Masud, “Performance study of hybrid Wireless Mesh Protocol (HWMP) for IEEE 802.11s WLAN mesh networks,” in Proceedings of the International Conference on Computer and Communication Engineering (ICCCE '12), pp. 712–716, July 2012. View at Publisher · View at Google Scholar · View at Scopus
  21. M. Shivlal and S. Kumar, “Performance analysis of secure wireless mesh networks,” Research Journal of Recent Sciences, vol. 1, no. 3, pp. 80–85, 2012. View at Google Scholar
  22. T.-M. Hoang, V.-L. Dinh, and K.-Q. Nguyen, “A study on routing performance of 802.11 based wireless mesh networks under serious attacks,” in Proceedings of the IEEE International Conference on Computing, Management and Telecommunications (ComManTel '13), pp. 295–297, Ho Chi Minh City, Vietnam, January 2013. View at Publisher · View at Google Scholar · View at Scopus
  23. S. Bhumireddy, S. Tripathy, and R. Matam, “Secure peer-link establishment in wireless mesh networks,” Advances in Intelligent Systems and Computing, vol. 176, no. 1, pp. 189–198, 2012. View at Publisher · View at Google Scholar · View at Scopus
  24. C. Perkins, E. Belding-Royer, and D. Samir, Ad Hoc on Demand Distance Vector (AODV) Routing (RFC 3561), IETF MANET Working Group, 2003.
  25. P. Owczarek and P. Zwierzykowski, “Review of simulators for wireless mesh networks,” Journal of Telecommunications & Information Technology, vol. 2014, no. 3, pp. 82–89, 2014. View at Google Scholar · View at Scopus
  26. B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, and A. Jamalipour, “A survey of routing attacks in mobile ad hoc networks,” IEEE Wireless Communications, vol. 14, no. 5, pp. 85–91, 2007. View at Publisher · View at Google Scholar · View at Scopus
  27. N. S. Chouhan and S. Yadav, “Flooding attacks prevention inMANET,” International Journal of Computer Technology and ElectronicsEngineering (IJCTEE), vol. 1, no. 3, 2011. View at Google Scholar
  28. M. O. Khozium, “Hello flood countermeasure for wireless sensor networks,” International Journal of Computer Science and Information Security, vol. 2, no. 3, pp. 57–65, 2008. View at Google Scholar
  29. U. Khartad and R. K. Krishna, “Route request flooding attack using trust based security scheme in Manet,” International Journal of Smart Sensors and Ad Hoc Networks, vol. 1, no. 4, pp. 27–33, 2012. View at Google Scholar
  30. D. M. Shila, Y. Cheng, and T. Anjali, “Mitigating selective forwarding attacks with a channel-aware approach in WMNS,” IEEE Transactions on Wireless Communications, vol. 9, no. 5, pp. 1661–1675, 2010. View at Publisher · View at Google Scholar · View at Scopus
  31. P. Zhou, Z. Xiang, and Y. Chen, “Detection method of gray-hole node in wireless mesh networks,” in Proceedings of the 5th International Conference on Computational and Information Sciences (ICCIS '13), pp. 1570–1573, IEEE, Shiyang, China, June 2013. View at Publisher · View at Google Scholar · View at Scopus
  32. L. Lazos and M. Krunz, “Selective jamming/dropping insider attacks in wireless mesh networks,” IEEE Network, vol. 25, no. 1, pp. 30–34, 2011. View at Publisher · View at Google Scholar · View at Scopus
  33. S. Khanam, H. Y. Saleem, and A. K. Pathan, “An efficient detection model of selective forwarding attacks in wireless mesh networks,” in Internet and Distributed Computing Systems, pp. 1–14, Springer, Berlin, Germany, 2012. View at Google Scholar
  34. A. A. Bhosle, T. P. Thosar, and S. Mehatre, “Black-hole and wormhole attack in routing protocol AODV in MANET,” International Journal of Computer Science, Engineering and Applications (IJCSEA), vol. 2, no. 1, pp. 45–54, 2012. View at Publisher · View at Google Scholar
  35. R. Maulik and N. Chaki, “A study on wormhole attacks in MANET,” International Journal of Computer Information Systems and Industrial Management Applications, vol. 3, no. 2, pp. 271–279, 2011. View at Google Scholar
  36. J. D. Parmar, A. D. Patel, R. H. Jhaveri, and B. I. Shah, “MANET routing protocols and wormhole attack against AODV,” International Journal of Computer Science and Network Security, vol. 10, no. 4, pp. 12–18, 2010. View at Google Scholar