Securing Locations of Mobile Nodes in Wireless Mesh Network’s

Abstract

The current deployment of wireless mesh networks requires mobility management to track the current locations of mobile nodes around the network without service interruption. To do so, the Hierarchical Mobile IPv6 protocol has been chosen, which minimises the required signalling by introducing a new entity called the mobile anchor point to act as a local home agent for all visiting mobile nodes in a specific domain. It allows a mobile node to register its local/regional care-of addresses with a mobile anchor point by sending a local binding update message. However, the local binding update is quite sensitive; it modifies the routing to enable mobility in the wireless mesh networks. When a local binding update message is spoofed, an attacker can redirect traffic that is destined for legitimate mobile node either to itself or to another node. This situation leads to an increased risk of attacks. Therefore, this paper contributes to addressing this security issue based on wireless mesh networks by cryptography generation and verification of a mobile node’s local and regional care-of addresses, as well as the application of a novel method to verify the reachability of mobile node at claimed local care-of address. This is called the enhanced mobile anchor point registration protocol. The Scyther tool has been used to ensure the proposed protocol accuracy. Furthermore, the performance, in terms of the mobile anchor point registration delay and signalling overhead, is evaluated by using the OPNET modeller simulator.

Authors and Affiliations

Sultan Alkhliwi

Keywords

Related Articles

A Two-Stage Classifier Approach using RepTree Algorithm for Network Intrusion Detection

In this paper, we present a two-stage classifier based on RepTree algorithm and protocols subset for network intrusion detection system. To evaluate the performance of our approach, we used the UNSW-NB15 data set and the...

An Approach to Finding Similarity Between Two Community Graphs Using Graph Mining Techniques

Graph similarity has studied in the fields of shape retrieval, object recognition, face recognition and many more areas. Sometimes it is important to compare two community graphs for similarity which makes easier for min...

An Interoperable Data Framework to Manipulate the Smart City Data using Semantic Technologies

During the last decade, enormous volumes of urban data have been produced by the Government agencies, the NGOs and the citizens. In such a scenario, we are presented with a diverse sets of data which holds valuable infor...

A Lightweight Approach for Specification and Detection of SOAP Anti-Patterns

Web-services have become a governing technology for Service Oriented Architectures due to reusability of services and their dependence on other services. The evolution in service based systems demands frequent changes to...

A Two Phase Hybrid Classifier based on Structure Similarities and Textural Features for Accurate Meningioma Classification

Meningioma subtype classification is a complex pattern classification problem of digital pathology due to het-erogeneity issues of tumor texture, low inter-class and high intra-class texture variations of tumor samples,...

Download PDF file
  • EP ID EP417598
  • DOI 10.14569/IJACSA.2018.091111
  • Views 68
  • Downloads 0

How To Cite

Sultan Alkhliwi (2018). Securing Locations of Mobile Nodes in Wireless Mesh Network’s. International Journal of Advanced Computer Science & Applications, 9(11), 70-81. https://europub.co.uk/articles/-A-417598