Securing Locations of Mobile Nodes in Wireless Mesh Network’s

Abstract

The current deployment of wireless mesh networks requires mobility management to track the current locations of mobile nodes around the network without service interruption. To do so, the Hierarchical Mobile IPv6 protocol has been chosen, which minimises the required signalling by introducing a new entity called the mobile anchor point to act as a local home agent for all visiting mobile nodes in a specific domain. It allows a mobile node to register its local/regional care-of addresses with a mobile anchor point by sending a local binding update message. However, the local binding update is quite sensitive; it modifies the routing to enable mobility in the wireless mesh networks. When a local binding update message is spoofed, an attacker can redirect traffic that is destined for legitimate mobile node either to itself or to another node. This situation leads to an increased risk of attacks. Therefore, this paper contributes to addressing this security issue based on wireless mesh networks by cryptography generation and verification of a mobile node’s local and regional care-of addresses, as well as the application of a novel method to verify the reachability of mobile node at claimed local care-of address. This is called the enhanced mobile anchor point registration protocol. The Scyther tool has been used to ensure the proposed protocol accuracy. Furthermore, the performance, in terms of the mobile anchor point registration delay and signalling overhead, is evaluated by using the OPNET modeller simulator.

Authors and Affiliations

Sultan Alkhliwi

Keywords

Related Articles

Pattern Visualization Through Detection Plane Generation for Macroscopic Imagery

Macroscopic images are kind of environments in which complex patterns are present. Satellite images are one of these classes where many patterns are present. This fact reflects the challenges in detecting patterns presen...

A Survey of Unstructured Text Summarization Techniques

Due to the explosive amounts of text data being created and organizations increased desire to leverage their data corpora, especially with the availability of Big Data platforms, there is not usually enough time to read...

Face Age Estimation Approach based on Deep Learning and Principle Component Analysis

This paper presents an approach for age estimation based on faces through classifying facial images into predefined age-groups. However, a task such as the one at hand faces several difficulties because of the different...

Complex Shear Modulus Estimation using Integration of LMS/AHI Algorithm

Elasticity and viscosity of tissues are two important parameters that can be used to investigate the structure of tissues, especially detecting tumors. By using a force excitation, the shear wave speed is acquired to ext...

Towards Multi-Stage Intrusion Detection using IP Flow Records

Traditional network-based intrusion detection sys-tems using deep packet inspection are not feasible for modern high-speed networks due to slow processing and inability to read encrypted packet content. As an alternative...

Download PDF file
  • EP ID EP417598
  • DOI 10.14569/IJACSA.2018.091111
  • Views 82
  • Downloads 0

How To Cite

Sultan Alkhliwi (2018). Securing Locations of Mobile Nodes in Wireless Mesh Network’s. International Journal of Advanced Computer Science & Applications, 9(11), 70-81. https://europub.co.uk/articles/-A-417598