A trustworthy and energy-aware routing protocol in software-defined wireless mesh networks
Computers and Electrical Engineering
© 2016 Elsevier Ltd. All rights reserved.
Reason for embargo
Hybrid Wireless Mesh Networks (HWMNs) were proposed to address the challenges in wireless communications to support mobile applications across different domains. Due to the multi-hop and decentralized network architecture, HWMNs are naturally susceptible to various security threats, especially internal attacks. Therefore, HWMNs must be able to detect anomalies, provide secure routing and protect user privacy through the cooperation among nodes. However, the existing routing protocols for HWMNs cannot ensure the security to protect the users privacy effectively. Moreover, traditional HWMNs are vertically integrated where the control and data planes of mesh routers are bundled together, which makes it complex and difficult to configure the network according to predefined security policies, and to adaptively respond to various dynamic security threats. Software-Defined Wireless Mesh Networks decouple the control plane and data plane of routers and thus enable a more flexible and efficient configuration of security policies. Taking up this opportunity to address the aforementioned challenges, this paper proposes a privacy-aware, secure and energy-aware green routing (PSGR) protocol that can defend against internal attacks, achieve stronger privacy protection and reduce energy consumption in Software-Defined HWMNs. The elaborate theoretical analysis verify that the PSGR protocol can implement the security and privacy protection against internal attacks effectively and efficiently. Simulation results demonstrate a superior performance of PSGR in terms of packet delivery ratio, network throughput and energy efficiency compared to the existing PA-SHWMP, PASER, and HWMP protocols in the presence of Blackhole/Grayhole attacks and wormhole attacks.
This work is supported by the National Natural Science Foundation of China (61472083, 61402110, 61402262, U1405255), the Fujian Normal University Innovative Research Team (IRTL1207), the UK EPSRC research grant (EP/M013936/2), the Foundation of Science and Technology on Information Assurance Laboratory (KJ-14-109), the Fujian Provincial Key Laboratory of Network Security and Cryptology Research Fund, and the Pilot Project of Fujian Province (formal industry key project) (2016Y0031).
This is the author accepted manuscript. The final version is available from the publisher via the DOI in this record.