securing multi-operator based qos-aware mesh …09wcmc.pdfwireless communications and mobile...

25
WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 00: 1–25 (2008) Published online in Wiley InterScience (www.interscience.wiley.com) DOI: 10.1002/wcm.0000 Securing Multi-operator Based QoS-aware Mesh Networks: Requirements and Design Options I. Askoxylakis 1 , B. Bencs ´ ath 2 , L. Butty ´ an 2* , L. D ´ ora 2 , V. Siris 1 , D. Szili 2 , I. Vajda 2 1 Institute of Computer Science Foundation for Research and Technology Hellas (FORTH) P.O. Box 1385, GR 711 10, Heraklion, Crete, Greece 2 Laboratory of Cryptography and System Security (CrySyS) Budapest University of Technology and Economics Magyar tud´ osok krt 2, H-1117 Budapest, Hungary Summary Wireless mesh networking allows network operators and service providers to offer nearly ubiquitous broadband access at a low cost to customers. In this paper, we focus on QoS-aware mesh networks operated by multiple operators in a cooperative manner. In particular, we identify the general security requirements of such networks and we give an overview on the available design options for a security architecture aiming at satisfying those requirements. More specifically, we consider the problems of mesh client authentication and access control, protection of wireless communications, securing the routing, key management, and intrusion and misbehavior detection and recovery. Our aim is to structure this rich problem domain and to prepare the grounds for the design of a practically usable security architecture. Copyright c 2008 John Wiley & Sons, Ltd. KEY WORDS: Wireless mesh networks, Authentication, Secure routing, Secure communications, Key management, Intrusion detection and recovery 1. Introduction Mesh networks [1, 2] represent an emerging wireless networking technology that promises wider coverage than traditional wireless LANs and lower deployment cost than 3G cellular networks. For these reasons, network operators and service providers consider mesh networking to be a serious candidate to solve the so called “last mile problem”. Indeed, at many places in the world, some network operators have already started to deploy mesh based solutions * Correspondence to: [email protected] offering nearly ubiquitous and inexpensive wireless Internet access to their customers. Examples for this development include Ozone’s mesh network in Paris (www.ozone.net/en/) and The Cloud in the City of London (www.thecloud.net). If these pilot projects turn out to be successful, then mesh networking may become extremely popular and wide-spread. While there also exist so called community based mesh networks that are operated by individuals, we believe that the real business potential lies in operator based mesh networks. By their systematic design, deployment, and maintenance, operator based mesh networks provide higher level of Quality-of-Service Copyright c 2008 John Wiley & Sons, Ltd. Prepared using wcmauth.cls [Version: 2007/01/09 v1.00]

Upload: others

Post on 27-Aug-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Securing Multi-operator Based QoS-aware Mesh …09wcmc.pdfWIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 00: 1–25 (2008) Published online in Wiley InterScience

WIRELESS COMMUNICATIONS AND MOBILE COMPUTINGWirel. Commun. Mob. Comput. 00: 1–25 (2008)Published online in Wiley InterScience(www.interscience.wiley.com) DOI: 10.1002/wcm.0000

Securing Multi-operator Based QoS-aware Mesh Networks:Requirements and Design Options

I. Askoxylakis1, B. Bencsath2, L. Buttyan2∗, L. Dora2, V. Siris1, D. Szili2, I. Vajda2

1Institute of Computer ScienceFoundation for Research and Technology Hellas (FORTH)P.O. Box 1385, GR 711 10, Heraklion, Crete, Greece

2Laboratory of Cryptography and System Security (CrySyS)Budapest University of Technology and EconomicsMagyar tudosok krt 2, H-1117 Budapest, Hungary

Summary

Wireless mesh networking allows network operators and service providers to offer nearly ubiquitous broadbandaccess at a low cost to customers. In this paper, we focus on QoS-aware mesh networks operated by multipleoperators in a cooperative manner. In particular, we identify the general security requirements of such networksand we give an overview on the available design options for a security architecture aiming at satisfying thoserequirements. More specifically, we consider the problems of mesh client authentication and access control,protection of wireless communications, securing the routing, key management, and intrusion and misbehaviordetection and recovery. Our aim is to structure this rich problem domain and to prepare the grounds for the designof a practically usable security architecture. Copyright c© 2008 John Wiley & Sons, Ltd.

KEY WORDS: Wireless mesh networks, Authentication, Secure routing, Secure communications, Keymanagement, Intrusion detection and recovery

1. Introduction

Mesh networks [1, 2] represent an emerging wirelessnetworking technology that promises wider coveragethan traditional wireless LANs and lower deploymentcost than 3G cellular networks. For these reasons,network operators and service providers considermesh networking to be a serious candidate to solvethe so called “last mile problem”. Indeed, at manyplaces in the world, some network operators havealready started to deploy mesh based solutions

∗Correspondence to: [email protected]

offering nearly ubiquitous and inexpensive wirelessInternet access to their customers. Examples for thisdevelopment include Ozone’s mesh network in Paris(www.ozone.net/en/) and The Cloud in the City ofLondon (www.thecloud.net). If these pilot projectsturn out to be successful, then mesh networking maybecome extremely popular and wide-spread.

While there also exist so called community basedmesh networks that are operated by individuals, webelieve that the real business potential lies in operatorbased mesh networks. By their systematic design,deployment, and maintenance, operator based meshnetworks provide higher level of Quality-of-Service

Copyright c© 2008 John Wiley & Sons, Ltd.Prepared using wcmauth.cls [Version: 2007/01/09 v1.00]

Page 2: Securing Multi-operator Based QoS-aware Mesh …09wcmc.pdfWIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 00: 1–25 (2008) Published online in Wiley InterScience

2 I. ASKOXYLAKIS, B. BENCSATH, L. BUTTYAN, L. DORA, V. SIRIS, D. SZILI, I. VAJDA

(QoS), meaning larger scale coverage, higher speed,and more reliable operation. In addition, it can beenvisioned that mesh network operators in a givengeographical area will cooperate in order to furtheroptimize their costs and increase the QoS provided bytheir networks. The form of the cooperation can rangefrom traditional roaming agreements to joint provisionof specific services. This kind of cooperation is lesslikely to happen between ad hoc communities. Hence,in this paper, we focus our attention on QoS-awaremesh networks operated by multiple operators.

In order to turn the tremendous business potentialrepresented by mesh networking into real profit, oneneeds to solve a number of technical problems relatedto the design and operation of mesh networks. In thispaper, we address one of those problems: securingmesh networks. It is evident that security issues needto be considered seriously and solved appropriately.The reason is that, due to the wireless nature ofthe communication medium, and due to the lack ofphysical protection of the unattended mesh nodes,it is relatively easy to carry out various attacksagainst mesh networks. Furthermore, if security isnot handled appropriately, then the customers mayprefer alternative technologies; this would hinderthe adoption and wide-spread deployment of meshnetworks, which in turn, would result in loss ofbusiness opportunities.

More specifically, in this paper, we identify thesecurity requirements that are relevant for wirelessmesh networks in general, and for multi-operatorbased QoS-aware mesh networks in particular. Weunderstand that security issues are often applicationspecific; however, here we are focusing on the generalsecurity requirements of wireless mesh networksthat are either independent of the applications orcommon to all applications. In addition to identifyingthe security requirements, we also present variousdesign options for a security architecture that aims atsatisfying those requirements.

Discussion of the security issues in wireless meshnetworks can be found in [3, 4, 5]. However, noneof those works address specifically QoS aware meshnetworks operated by multiple operators, neitherthey deal with proactive (cryptographic) and reactive(intrusion detection based) security measures in acombined manner as we do in this paper. Thediscussion in [3] focuses on giving an overview of thevarious authentication mechanisms and secure routingprotocols proposed for mobile ad hoc networks.Unfortunately, it is very much centered aroundacademic proposals with little practical relevance.

Moreover, the mechanisms and protocols proposedfor mobile ad hoc networks are useful, but theyare not suitable for direct application in meshnetworks. The authors of [4] discuss three specificsecurity problems in wireless mesh networks: thedetection of compromised mesh routers, the securityof routing, and the problem of fairness. Theseare important problems, but they represent only asomewhat arbitrary subset of the security issues inwireless mesh networks. Finally, the discussion in[5] is specific to wireless mesh network securityand it is quite comprehensive in terms of identifiedsecurity issues. Indeed, the security requirements thatwe identify in this paper are more or less the sameas those identified in [5]. Our contributions thatmake this paper different from [5] include a moredetailed discussion of the available design choicesfor authentication and network access control, forthe protection of wireless communications, and forintrusion and misbehavior detection, as well as amore QoS specific discussion of the routing securityproblem. Another difference is that, in this paper, wefocus on multi-operator based mesh networks, while[5] discusses other scenarios too.

The organization of the paper is the following:First, we introduce our system model in Section 2and our adversary model in Section 3. Based on thesemodels, we identify the general security requirementsin Section 4. Next, we present design options forthe elements of a security architecture that aim atsatisfying the identified security requirements. Moreprecisely, we address mesh client authentication andnetwork access control in Section 5, protection ofwireless communications in Section 6, security ofrouting in Section 7, key management issues inSection 8, and intrusion and misbehavior detection andrecovery in Section 9. Finally, we conclude the paperin Section 10.

2. System model

A detailed survey on mesh network architecturescan be found in [1]. In this paper, we consider thefollowing model (see also Figure 1 for illustration):A mesh network consists of mesh routers that forma static wireless ad hoc network. Some of the meshrouters function as gateways to the wired Internet, andsome of them function as wireless access points wheremobile mesh clients can connect to the network. Thesets of gateways and access points can overlap andthey do not necessarily cover the entire set of meshrouters.

Copyright c© 2008 John Wiley & Sons, Ltd.Prepared using wcmauth.cls

Wirel. Commun. Mob. Comput. 00: 1–25 (2008)DOI: 10.1002/wcm

Page 3: Securing Multi-operator Based QoS-aware Mesh …09wcmc.pdfWIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 00: 1–25 (2008) Published online in Wiley InterScience

SECURING MULTI-OPERATOR BASED QOS-AWARE MESH NETWORKS 3

AP MR

AP MR

AP MR

MR GW

MC

MR

MR GW

MC

MC

MC

Internet

AP - access pointGW - gateway

wireless linkwired connection

MC - mesh clientMR - mesh router

Fig. 1. Illustration of a mesh network.

As shown in Figure 1, we assume that the meshclients connect to the access points directly (i.e., meshclients are one hop away from the mesh network).In theory, mesh clients could provide data forwardingservices to each other, and connect to the access pointsvia multiple other mesh clients, but this would requirespecial software on the mesh clients (essentially theywould function as a router). In practice, however, usersmay not be willing to modify their mesh clients and tobehave cooperatively, and for this reason, we do notconsider this possibility of connecting to the accesspoint through multiple mesh clients.

The mesh routers are operated by multipleoperators, and we assume that they cooperate in theprovision of networking services to the mesh clients.This cooperation is based on business agreements(similar to roaming agreements in the case ofcellular networks). Mesh clients are mobile computersoperated by customers. Customers may be associatedwith one or more operators by contractual means.

Mesh clients use the services provided by the meshnetwork in order to run various applications. Typically,mesh clients use the mesh network to access theInternet, or they run applications that take advantageof the connectivity provided by the mesh networkitself (e.g., mesh clients can communicate with eachother through the mesh routers without accessing theInternet).

The mesh network supports QoS-based applicationsand mobility of the mesh clients. In other words, weassume that appropriate mechanisms are used withinthe network to provide services with QoS guarantees(e.g., the routing protocol uses QoS-aware routingmetrics, and it may use admission control and resource

reservation mechanisms too), and to ensure seamlesshandover between access points for the mobile meshclients. We are not considering the details of thesemechanisms; we are interested only in their generalsecurity requirements.

3. Adversary model

As usual, the first step in the identification of securityrequirements is the understanding of the potentialattacks against the system. This understanding issummed up in the following adversary model thatdescribes the classes of attackers, their objectives, andtheir means to attack the system.

Classes of attackers. Taking into account thesystem model described above, we can identify threetypes of attackers:

• External attackers: These are attackers that haveno legitimate access to the mesh network and itsservices, but they have appropriate equipmentto use the wireless medium and interfere withthe operation of the mesh network protocols. Inaddition, these attackers may have unsupervisedphysical access to some of the mesh routersthat are installed in public areas, and they havethe knowledge to modify the behavior of theserouters by installing rogue software on them.

• Dishonest customers: These are misbehavingend-users that have legitimate access to themesh network services and try to take advantageof this in order to interfere with the operationof the network or to gain illegal access to

Copyright c© 2008 John Wiley & Sons, Ltd.Prepared using wcmauth.cls

Wirel. Commun. Mob. Comput. 00: 1–25 (2008)DOI: 10.1002/wcm

Page 4: Securing Multi-operator Based QoS-aware Mesh …09wcmc.pdfWIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 00: 1–25 (2008) Published online in Wiley InterScience

4 I. ASKOXYLAKIS, B. BENCSATH, L. BUTTYAN, L. DORA, V. SIRIS, D. SZILI, I. VAJDA

its services (e.g., by impersonating anothercustomer).

• Dishonest operators: These are operators of themesh infrastructure that do not honestly stick tobusiness agreements.

Objectives of attacks. We identify the followingmain objectives of attacks:

• Unauthorized access to the services providedby the mesh network (e.g., Internet access):Primarily, this objective is relevant for externalattackers and dishonest customers. In the lattercase, the dishonest customer may try to useservices that are not included in his subscription.

• Unauthorized access to customer data andmeta-data: Here customer data means thecontent of the messages exchanged in a servicesession, whereas meta-data refers to informationon the customer’s location and service usageprofile (e.g., which applications are used andhow often). Thus, the first objective is related toviolating the confidentiality, and the second isrelated to violating the privacy of the customer.Primarily, this objective is relevant for externaladversaries and dishonest operators.

• Denial-of-Service (DoS): This objective isrelated to degrading the QoS offered by thenetwork (including the complete disruption ofservices). Primarily, this is relevant for externaladversaries.

• Gaining advantage over competitors: For dis-honest operators, the primary reason to mountattacks on the system (especially on those partsthat are operated by other operators) is to gainsome advantage over their competitors. This isachieved either by destroying the reputation ofa competitor, or by dishonestly increasing one’sown good reputation.

Attack mechanisms. There are a multitude of attackmechanisms that can be used and combined in orderto reach the goals described above. However, most ofthese mechanisms fall into either one of the followingtwo categories:

• Attacks on wireless communications (includingeavesdropping, jamming, replay, and injectionof messages, and traffic analysis);

• Setting up fake mesh routers or compromisingexisting mesh routers (typically by physicaltampering or logical break-in). The behavior of

the fake or compromised mesh routers can bearbitrarily modified in order to help to achievespecific attack objectives.

4. Security requirements

Based on the adversary model described above, we canidentify the following main security requirements forwireless mesh networks:

Authentication of mesh clients and access control.In order to prevent unauthorized access to services,mesh clients must be authenticated, and access controlrules must be enforced in the system. Ideally, accesscontrol enforcement should take place at the accesspoints such that unauthorized access attempts aredenied as early as possible without affecting the restof the network. There are many options to satisfythis requirement in terms of available authenticationprotocols and authorization schemes. However, thereare additional requirements that need to be satisfied,which may exclude some of those options. Theserequirements include the need to support end-usermobility and QoS-aware applications, and the need towork in a multi-operator environment.

Supporting user mobility and QoS-aware applica-tions means that re-authentication of mesh clientsand access authorizations should be fast such thatthe requirements of authentication and access controldo not exclude the possibility of seamless handoverbetween the access points. In addition, the multi-operator environment means that such handovers mayoccur between access points belonging to differentadministrative domains, and hence, the authenticationand access control scheme must be able to handle thissituation.

Protection of wireless communications. Wirelesscommunications between mesh clients and meshrouters, as well as among mesh routers and gatewaysmust be protected against various attacks. This leadsto the following requirements:

• The confidentiality and the integrity of theapplication data must be protected in order toprevent unauthorized access to user data. Thiscan be done in an end-to-end manner, however,some applications may not be prepared for thisprotection, in which case, it is desirable to solvethe problem transparently to the applicationswithin the mesh network itself.

Copyright c© 2008 John Wiley & Sons, Ltd.Prepared using wcmauth.cls

Wirel. Commun. Mob. Comput. 00: 1–25 (2008)DOI: 10.1002/wcm

Page 5: Securing Multi-operator Based QoS-aware Mesh …09wcmc.pdfWIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 00: 1–25 (2008) Published online in Wiley InterScience

SECURING MULTI-OPERATOR BASED QOS-AWARE MESH NETWORKS 5

• Message integrity and authenticity must beprovided ideally in a link-by-link manner suchthat fake, modified, and replayed messages areidentified and removed as early as possible, andtherefore, they do not waste the bandwidth ofthe network.

• Traffic analysis must be prevented as muchas possible in order to prevent unauthorizedaccess to meta-data of the customers, and hence,to ensure some degree of privacy. Link-by-link encryption of messages can help in thismatter, as it can hide end-to-end addressinginformation. In addition, dummy traffic can bemaintained by neighboring mesh routers on idlelinks in order to prevent the identification ofcommunication profiles.

Increasing the robustness of the networkingmechanisms. The easiest way to mount stealth DoSattacks against a network is to manipulate its basicmechanisms such as the routing protocol, the mediumaccess control scheme, the topology control andchannel assignment mechanisms, etc. For this reason,it is important to increase the robustness of thesebasic networking mechanisms. In particular, securingthe routing protocol seems to be the most importantrequirement in this category, because interfering withthe routing protocol may affect the entire network,whereas attacks on lower layers (e.g., on mediumaccess control and channel assignment) seem to havea localized effect.

In general, QoS-aware routing protocols providethree functions: (1) proactive dissemination of routinginformation (e.g., link quality metrics) and localroute computation, or on-demand route discovery(depending on the type of the protocol), (2) resourcereservation on selected routes (for the purpose of QoSguarantees), and (3) recovery from errors during thedata forwarding phase.

All of these three functions have their securityrequirements. Routing information dissemination androute discovery requires the authentication andintegrity protection of routing control messages,in order to prevent their manipulation by externaladversaries. In addition, in some protocols, specialattention must be paid to the protection of non-traceable mutable information (e.g., the cumulativerouting metric values) in routing control messagesagainst misbehaving mesh routers. It may also bedesirable to ensure non-repudiation of routing controlmessages in order to discourage operators to mount

stealth attacks against each other, and to facilitatedispute resolution.

Resource reservation messages must also need to beauthenticated in order to avoid resource blocking DoSattacks. Similarly, it must be guaranteed that resourcesdo not stay reserved forever. Finally, error recoveryprocedures should not be exploitable by attacks aimingat the disruption of communication or increasing themessage overhead in the network.

Intrusion and misbehavior detection and recovery.Due to the fact that our adversary model allowsfor dishonest operators and physical tampering ofmesh routers by external attackers, we must assumethat some fraction of the mesh routers may exhibitarbitrary (also called Byzantine) behavior. It is moreor less impossible to identify such misbehaving nodesby cryptographic means. Similarly, cryptographicsolutions are ineffective against jamming attacks.Therefore, besides the proactive security measures thatwe have described above, one must also consider theapplication of some reactive measures aiming at thedetection and recovery from attacks based on intrusionand misbehavior.

As misbehavior can happen at any layer of thecommunication stack, misbehavior detection shouldbe implemented in all layers; moreover, variousmisbehavior detection modules can be combined ina cross layer approach to increase the effectivenessof the detection. Misbehavior detection and recoveryrequires that the nodes can monitor the activity ofeach other (at least to some extent), that they canidentify suspicious activities, and that they can makecounteractions (e.g., they can exclude misbehavingnodes from the network). This also means that somelevel of cooperation must take place between thenodes.

Key management. Some of the security require-ments that we identified in this section (in partic-ular, mesh client authentication and access control,protection of wireless communications, and someaspects of increasing the robustness of the basicnetworking mechanisms such as routing) are mostconveniently satisfied by using some cryptographicmechanisms. Cryptographic mechanisms, in turn,require cryptographic keys and key managementsolutions.

More specifically, cryptographic protection mecha-nisms in mesh networks may require the establishmentof shared symmetric keys between various entities

Copyright c© 2008 John Wiley & Sons, Ltd.Prepared using wcmauth.cls

Wirel. Commun. Mob. Comput. 00: 1–25 (2008)DOI: 10.1002/wcm

Page 6: Securing Multi-operator Based QoS-aware Mesh …09wcmc.pdfWIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 00: 1–25 (2008) Published online in Wiley InterScience

6 I. ASKOXYLAKIS, B. BENCSATH, L. BUTTYAN, L. DORA, V. SIRIS, D. SZILI, I. VAJDA

(e.g., between mesh routers, between an authenticationserver and an access point, etc.) and the distributionof the public keys of various entities (e.g., meshrouters, authentication servers, etc.). Both of thesecan be supported by a public key infrastructure (PKI)established and maintained by the mesh networkoperators. Moreover, given that we are consideringa multi-operator environment where security associa-tions are often established between entities that belongto different administrative domains, a PKI based keymanagement approach seems to be the conceptuallysimplest and most convenient solution.

5. Authentication of mesh clients andaccess control enforcement

In a business driven mesh network, it is essentialthat only authorized users can access the network.To fulfill this requirement, authentication and accesscontrol enforcement is required. In the authenticationprocess, the mesh client proves its identity usingan authentication key. In addition, during theauthentication process, a short-term connection key isestablished between the mesh client and the accesscontrol enforcement point. This connection key servesas the basis for access control enforcement on thefollow-up traffic originating from the mesh client.

In this section, we first introduce a detailed listof requirements for authentication and access controlenforcement in QoS aware multi-operator maintainedmesh networks. Then, we give an overview ofthe authentication and access control enforcementmechanisms proposed for WiFi and mesh networks,and we analyze them with respect to the identifiedrequirements.

5.1. Requirements

The main requirements for authentication and accesscontrol enforcement in a QoS aware multi-operatormaintained mesh network are the following:

• Fast authentication method to support usermobility: As a main requirement, the authenti-cation method has to support mobility of meshclients which may use QoS aware services (e.g.VoIP). Such services may have requirementson the length of the interruptions in thecommunication that they can tolerate. When amesh client moves from one access point toanother, it has to re-authenticate itself as partof the handoff process. Before a successful

authentication process the mesh client shouldnot be allowed to access the network (otherwise,it can exploit by changing the access points andgaining access without authentication). Thus,the re-authentication delay must be minimizedin order to ensure that the interruption causedby the handoff remains tolerable for theapplications.

• Connection keys should not reveal long termkeys: The connection keys that the accesspoints obtain during the authentication of themesh clients should not reveal any long-termauthentication keys. This requirement must holdbecause in the multi-operator environment, themesh clients may associate to access pointsoperated by foreign operators.

• Independence of connection keys: As theneighboring access points may not trustfully each other due to the multi-operatorenvironment, the authentication and the keygeneration mechanism have to prevent an accesspoint from deriving connection keys that areused at another access point.

• Freshness: It must be ensured for bothparticipants that the connection key derivedduring the authentication process is fresh.

• DoS resistance: The authentication methodshould not create any vulnerabilities to DoSattacks. Note, that a successful attack against acentral unit (e.g. central authentication server)may lead to a state where no handoff can becompleted.

• Compatibility with standards: In a multi-operator environment, it is fundamental that theprotocols used in the authentication mechanismare standardized or built from standardizedelements. Otherwise a mesh client will not beable to authenticate itself at an access pointbelonging to another mesh operator.

• Scalability: One of the main advantages ofmesh networks is the increased coverage. This,however, usually means an increased number ofmesh routers, access points, and mesh clients.Therefore, the authentication method must bescalable in terms of the number of access pointsand mesh clients.

• No single trusted entity: In a multi-operatorenvironment, no single trusted entity mayexist. Hence, each operator should run itsown authentication server(s), but those couldcooperate with the servers of other operatorsbased on business agreements.

Copyright c© 2008 John Wiley & Sons, Ltd.Prepared using wcmauth.cls

Wirel. Commun. Mob. Comput. 00: 1–25 (2008)DOI: 10.1002/wcm

Page 7: Securing Multi-operator Based QoS-aware Mesh …09wcmc.pdfWIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 00: 1–25 (2008) Published online in Wiley InterScience

SECURING MULTI-OPERATOR BASED QOS-AWARE MESH NETWORKS 7

5.2. Proposed methods

Taxonomy. In the literature, many authenticationand access control enforcement methods have beenproposed. We categorize them by the place of theaccess control enforcement and by the place and typeof the authentication.

The access control can be enforced at the followingplaces:

• Central access control enforcement: In thiscase, the access control enforcement is doneoutside of the mesh network by a special entityin a centralized manner.

• Access control enforcement at the border of themesh network: In this case, the access control isenforced by the gateways that are placed at theborder of the mesh and the wired network.

• Distributed access control enforcement: In thiscase, the access control is enforced by the accesspoints themselves.

If the access control is enforced by a centralentity or at the gateways, then the system can notbenefit from authenticating the mesh clients inside themesh network. If the access control enforcement isdistributed, the mesh client can be authenticated at thefollowing network elements:

• Remote authentication server: In this case,the authentication servers of the operators areplaced outside of the mesh network.

• Local authentication servers: In this case,the authentication servers are placed near tothe access points within the mesh network,therefore, they can be reached by the accesspoints within a few wireless hops.

• Access points as distributed authenticationservers: In a totally distributed approach,the access points themselves function asauthentication servers.

During the handoff, the authentication process canbe initiated in a reactive or in a proactive manner:

• Reactive authentication: In this case, theauthentication of the mesh client to the nextaccess point and the establishment of theconnection keys are carried out when the meshclient has already associated with the nextaccess point.

• Proactive authentication: In this case, theconnection keys are distributed to the potentialnext access point before the handoff process isstarted.

In addition, we classify proactive solutions by theparticipant who controls the key distribution:

• Mesh client driven key distribution: Beforea mesh client performs a handoff, it createssecurity associations with the next or with eachpotential next access point.

• Authentication server driven key distribution:An authentication server distributes mesh clientspecific keys among the potential next accesspoints in such that the keys are available beforethe mesh client associates with the next accesspoint.

In Table I, we categorized the proposed authenti-cation methods found in the literature according tothe above described taxonomy. In what follows, wedescribe the categories in more details and we outlinethe main idea of the related proposals.

Note that the most of the proposed authenticationprocedures do not take into consideration the multi-operator environment. According to this, we considerthe multi-operator environment only through theformerly defined requirements and we describe themin the single operator environment unless we stateotherwise.

Centralized enforcement of access control. In anarchitecture where the access control enforcement iscentralized, no authentication is required at the accesspoints during the handoff process. The mesh client canassociate to any access point, and the access controlis enforced by redirecting the traffic of the meshclient to a central access control enforcement unit.The central unit makes forwarding decisions based onthe origin of the traffic, typically, based on the MACand/or IP addresses of the mesh client. This solutionis often used in WiFi hotspots, for instance, using theChilispot implementation [6]. The main drawback isthat no connection key is established and an attackercan easily gain access by spoofing the MAC and IPaddresses of an already authenticated device.

Another centralized solution is proposed in [7,8], where the authors propose an architecture basedon PANA (Protocol for carrying Authenticationfor Network Access) [28]. The mesh client isauthenticated only once, when it first associates withan access point. After a successful authentication,an IPSec tunnel can be established between themesh client and central access control enforcemententity, which obtains the connection key from theauthentication server. As only the mesh client and theaccess control enforcement entity can use this IPSec

Copyright c© 2008 John Wiley & Sons, Ltd.Prepared using wcmauth.cls

Wirel. Commun. Mob. Comput. 00: 1–25 (2008)DOI: 10.1002/wcm

Page 8: Securing Multi-operator Based QoS-aware Mesh …09wcmc.pdfWIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 00: 1–25 (2008) Published online in Wiley InterScience

8 I. ASKOXYLAKIS, B. BENCSATH, L. BUTTYAN, L. DORA, V. SIRIS, D. SZILI, I. VAJDA

Table I. Categorized list of the proposed authentication methods

Central [6, 7, 8, 9]Border [7, 8, 9]

DistributedAccessControl

Enforcement

````````````````Authenticator

Key distributiontype Reactive

ProactiveAuthentication Mesh clientserver driven driven

Access points [10, 11] [12, 13] [14]Local authentication servers [15, 16] [17, 18, 19] [20, 21, 22,

23, 24, 25]Remote authentication server [20, 26, 27]

tunnel, this can be the basis of the access controlenforcement.

The CAPWAP (Control And Provisioning ofWireless Access Points) standard [29] (currently indraft version) supports the centralized access controlenforcement. The binding to the IEEE 802.11 standardis presented in [9]. Herein, the physical and link levelfunctionality of the access points are separated andthe link level functionality is implemented in a centralentity. This central entity communicates with a meshclient through a tunnel established between the centralentity and the access point where the mesh client isassociated to. When the mesh client re-associates at adifferent access point, a 4-way handshake is performedbetween the mesh client and the central entity.

The main advantage of central access controlenforcement is that no key material is stored inthe access points. Hence, an attacker is not able toobtain any keys by compromising an access point.However, this architecture is extremely vulnerable toDoS attacks, because there is no possibility to deny theaccess before a message arrives to the central accesscontrol enforcement unit, and hence, an attacker candecrease the QoS level by injecting fake messagesinto the system. Another drawback is that the centralunit is a bottleneck resulting in a potential scalabilityproblem.

Access control enforcement at the gateways.When the access control is enforced at the borderof the wired and the mesh network, the mesh clientcan authenticate either to the gateway or to a centralauthentication server. However, so far, no proposalexists where the gateway authenticates the meshclients.

With the mesh networks, the operators gain acheap or feasible way of enlargement of the wirelessradio coverage. However, the main objective remainsto offer access to the Internet. From this point of

view, the gateways can be good points to prevent theunauthorized access as it requires less administration.

The PANA protocol proposed in [7, 8] can also beused in the case when the mesh client is authenticatedto a central authentication server but the access controlis enforced at the gateways. This is so because PANAallows for the existence of multiple access controlenforcement entities. Hence, each gateway can be anaccess control enforcement entity that obtains the keysfor access control enforcement from the authenticationserver. This mechanism improves the scalability of thecentralized access control enforcement, but the DoSvulnerability described earlier still remains.

The mechanism proposed in the CAPWAP standard[9] can suit to the gateway enforced access control.In that case, the gateway is the central entity whichoperates some access points. However, a handovermay perform between two access points whichbelongs to different gateways and in that case ahandover between gateways should be defined.

Distributed access control enforcement with reac-tive authentication using a remote authenticationserver. A typical example of this case is the IEEE802.1X [30] authentication and access control modelas described in the IEEE 802.11i standard [20]. In thismodel, access control is enforced by the access pointsin a distributed manner. The client authenticates itselfto a remote authentication server, which informs theaccess point about the result of the authentication, andalso distributes a connection key. This connection key(or keys derived from it) is used to secure the follow-up communication at the link layer.

The messages of the authentication protocol arecarried by the Extensible Authentication Protocol(EAP) [31]. While many authentication protocols havebeen standardized in this framework (e.g., EAP-TLS,EAP-FAST, EAP-SIM), none of them are optimizedfor fast handoff. Recently, a new EAP method has beendescribed for fast re-authentication in [26] and [27].

Copyright c© 2008 John Wiley & Sons, Ltd.Prepared using wcmauth.cls

Wirel. Commun. Mob. Comput. 00: 1–25 (2008)DOI: 10.1002/wcm

Page 9: Securing Multi-operator Based QoS-aware Mesh …09wcmc.pdfWIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 00: 1–25 (2008) Published online in Wiley InterScience

SECURING MULTI-OPERATOR BASED QOS-AWARE MESH NETWORKS 9

We have already overviewed the CAPWAP standard[9] in distributed access control section. Recall thatthe physical and link level functionality of theaccess points are separated herein and the linklevel functionality is implemented in a central entity.The CAPWAP standard has a special feature (notmentioned before) which supports the delegation ofthe access control to the access points by sendingthe established connection key to the access points.The connection key is delivered due to the protocoldescribed in the CAPWAP standard after a successful4-way handshake performed between the mesh clientand the central entity.

The main drawback of this approach is thatthe round trip time may increase significantly withthe increasing distance (measured in wireless hops)between the access point and the authentication server.Hence, the round trip time can easily become higherthan the round trip time that a QoS aware servicecan tolerate. Note that no application data can traversethe mesh network until the authentication is finished.Furthermore, the central authentication server is asingle point of failure, which is vulnerable to DoSattacks.

Distributed access control enforcement with reac-tive authentication using local authenticationservers. The problems listed above can be solvedby using local authentication servers placed closeto the access points. Two EAP standard extensionsin [15, 16] are proposed to reduce the round triptime of the authentication messages by using localauthentication servers placed between the accesspoints and the central authentication server. Thecentral authentication server is able to share theauthentication key or a key derived from theauthentication key with the local authenticationservers. When an access point turns to any of thelocal authentication servers, that authentication servergenerates the connection key and sends it to the accesspoint.

The main drawback of using local authenticationservers is that those servers are within the meshnetwork where they may not be physically protected.Hence, it is hazardous to store long-term authentica-tion information on them, as that information can beeasily compromised.

Distributed access control enforcement with reac-tive authentication using the access points. Theauthentication is scalable and no preparations arerequired before the handoff when the authentication is

performed between the mesh client and access pointsin a reactive way. However, other requirements maynot be fulfilled as two proposals show.

The ID-based public-private key pairs can be usedboth for authentication and for key agreement withoff-line central authority as it is exploited in [10].However, the private keys should be issued by thesame central authority. Therefore, when a mesh clientassociates to a foreign access point it requires to havea temporary public-private key pair from the foreignoperator for the key agreement or it can obtain oneafter an authentication process. In the latter case, fasthandoff can not be guaranteed.

In [11], the authors suggest a change in the port-based network access control operation of IEEE802.1X. Instead of restricting the mesh client toauthentication messages through the uncontrolledport, the current access point allows mesh clientsaccess to normal data traffic via a dynamicallyestablished tunnel between the current and theprevious access point. The tunnel remains alive untilthe authentication is completed.

Distributed access control enforcement with serverdriven proactive authentication. In server drivenproactive authentication methods, the authenticationserver is responsible for distributing connection keysprior to the handoff. Thus, when the handoff is takingplace, the access points are able to make access controldecisions locally without turning to the authenticationserver.

In [17], the connection keys are generated using theauthentication key, the MAC addresses of the meshclient and the access point, and the connection keyused at the current access point. The authenticationserver generates keys for the neighbors of thecurrent access point and distributes among them. Byneighbors, we mean the potential next access pointsthat the mesh client may associate with. In thissolution, the authentication server has to be awareof the location of the mesh clients, otherwise it isnot able to determine which access points need keysnext. A very similar idea is described in [18] withsome improvements: 1) the current AP sends thelist of neighbors to the authentication server and 2)optionally, the current access point can distribute thecurrent connection keys among the neighboring accesspoints using IAPP protocol to postpone the connectionkey generation.

In [19], the GSM authentication model was adoptedto a WiFi environment. The authentication servergenerates so called triplets which consist of some

Copyright c© 2008 John Wiley & Sons, Ltd.Prepared using wcmauth.cls

Wirel. Commun. Mob. Comput. 00: 1–25 (2008)DOI: 10.1002/wcm

Page 10: Securing Multi-operator Based QoS-aware Mesh …09wcmc.pdfWIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 00: 1–25 (2008) Published online in Wiley InterScience

10 I. ASKOXYLAKIS, B. BENCSATH, L. BUTTYAN, L. DORA, V. SIRIS, D. SZILI, I. VAJDA

authentication information and a connection key. Thetriplets are sent proactively to the potential next accesspoints that can use the authentication informationtherein to authenticate the mesh client performing thehandoff, and the connection key for further accesscontrol enforcement. As the triplets are generated bythe authentication server, the access points do not haveto store long-term authentication keys. No concretetriplet distribution mechanism is proposed in thatpaper.

Distributed access control enforcement with meshclient driven proactive authentication. In contrastto server driven proactive authentication mechanisms,in the client driven case, the mesh clients themselvesare responsible for getting the connection keys to theaccess points.

A mechanism called pre-authentication was pro-posed in the IEEE 802.11i standard [20] that allowsa mesh client to establish connection keys with thepotential next access points prior to the handoff byperforming full authentication through the currentaccess point. The main advantage of this mechanismis that it is standardized and supports QoS awareservices. However, the main drawback is that pre-authentication requires link level connection betweenthe access points, and therefore, the mesh clientcan establish connection keys only with the one-hopneighbors of the current access point. Unfortunately,the set of potential next access points may not coincidethe set of one-hop neighbors of the current accesspoint.

In the IEEE 802.11r [21] standard, when a meshclient first connects to the network, it performs a full802.1X authentication with a remote authenticationserver. The access point AP0 through which thisfull authentication is performed will play a specialrole during the upcoming handovers. Before leavingthe access point currently associated with, the meshclient indicates the handover and the identity of AP0

to the next access point (through the current accesspoint or directly). The next access point obtains anauthentication key K from AP0. The mesh client isable to generate K using some public informationand the initial authentication key shared with AP0.The handover is completed by running the 4-wayhandshake with the next access point and derivingconnection keys from K.

The usage of multiple radio interfaces in meshclient devices was proposed in [24]. When multipleradio interfaces are available, one radio interface canbe associated with a current access point and used

for data traffic, while the other radio interface(s)can independently establish connection keys withother access points within radio range. The handoffthen consists in swapping the roles of the radiointerfaces: the radio interface which has alreadyestablished a security association with the next accesspoint becomes responsible for the data traffic, andthe other radio interfaces(s) continues establishingsecurity associations with new access points. Usingmultiple radio interfaces eliminates the problem thatwe identified in the case of pre-authentication, butthis solution requires special hardware support (i.e.,multiple radio interfaces) in the mesh client devices.

A solution is proposed in [22, 23] for simplifyingthe connection key establishment between the meshclient and all the potential next access points.For this objective, the authors modified the keydistribution mechanism of the IEEE 802.1X model.According to this modification, the mesh client andthe authentication server establish a new connectionkey through the current access point, which is thendistributed by the authentication server to the potentialnext access points. This approach is not compatiblewith the IEEE 802.11i standard, and it does not satisfythe requirement of independence of connection keys,because the new connection key is distributed amongall the potential next access points.

Two ticket based approaches are introduced in[25]. The idea is that after a full authentication,the authentication server generates tickets for eachaccess point where the mesh client could moveaccording to its mobility pattern. The tickets aredelivered in one proposed solution to the potentialnext access points and in the other proposed solutiondirectly to the mesh client. In the former case, thecommunication between the access points is basedon the IEEE 802.11f protocol, also known as InterAccess Point Protocol (IAPP) [32]. In the latter case,the mesh client sends the tickets to the access point atthe time of the handoff. The tickets are encrypted usingunique shared secrets between each access point andthe authentication server. Therefore, the access pointscan obtain only those keys that are related to theirown connections. The main drawback of this solutionis the mobility prediction mechanism that has to bevery precise, otherwise, no connection key may beestablished at the access point which the client wantsto associate with. Furthermore, the IAPP protocol waswithdrawn in 2006.

Distributed access control enforcement with proac-tive authentication to the access point. Instead

Copyright c© 2008 John Wiley & Sons, Ltd.Prepared using wcmauth.cls

Wirel. Commun. Mob. Comput. 00: 1–25 (2008)DOI: 10.1002/wcm

Page 11: Securing Multi-operator Based QoS-aware Mesh …09wcmc.pdfWIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 00: 1–25 (2008) Published online in Wiley InterScience

SECURING MULTI-OPERATOR BASED QOS-AWARE MESH NETWORKS 11

of authenticating to a remote or local authenticationserver, in this category of solutions, the mesh clientauthenticates to the access point in a proactive manner.

There are two papers that follow this approach.In [14], the authors propose a solution where thecurrently used connection key is distributed to thepotential next access points by the current accesspoint, and it is re-used there when the handoff takesplace. The drawback is that this solution does notsatisfy the requirement of independence of connectionkeys. In addition, the access points must trust eachother even if they belong to different operators, whichmeans that the requirement of no single trusted entityis not satisfied either.

In [12, 13], the mesh client carries the newconnection key in a credential that is sent to it bythe current access point prior to the handoff. Thecredential is encrypted with a key shared betweenthe current access point and the next access points.After associating with the next access point, the meshclient shows its credential, and the new access pointdecodes the connection key. Because of the timeconstraints, the authors propose to use symmetriccryptography to encrypt and decrypt the credentials.The authors also propose to run a full authenticationafter the lightweight credential based authorization.The mesh client can send data traffic parallel to thefull authentication, hence, there are no constraints forthe speed of the full authentication. The requirement ofindependence of connection keys is not fully satisfiedin this solution either, because the previous accesspoint generates the new connection keys. However,in this case, a full authentication is also carried out,therefore, this requirement remains unsatisfied onlyfor a short period of time. The main drawback is thatthe mechanism as proposed does not fit any standards.

Generation of connection keys. Considering thegeneration of connection keys in the various proposals,the connection keys are computed using the followingdata (or some part of them): the authentication key,the previous connection key, public information ofthe access point, some random numbers. Table IIshows what requirements are fulfilled by the differentinput data. Note that during the computation of theconnection keys, these input data can be combined.However, the combination must ensure that the accesspoints are not able to obtain the authentication keyfrom the computed connection keys. Besides theappropriate key generation process, the independenceof the connection keys can be fulfilled by performinga full authentication after the completed fast handoff.

Table II. Requirements and proposed solution for connection keygeneration

Ensure freshness for the mesh clientEnsure freshness for the access point

Independence of connection keysLong term key protection

Mutual authenticationAuthentication key 3 7 7 7 7

Previous connection key 7 3 7 3 3Public information of AP 7 3 3 7 7

Random number from AS† 7 3 3 3 7Random number from MC 7 3 3 7 3† AS – Authentication server

5.3. Summary

In Table III, we summarize how the variousapproaches for authentication and access controlenforcement described above satisfy the requirementsidentified earlier. Unfortunately, it is unambiguouswhat compatibility of a whole category with standardsmeans.We indicate that a category is compatible withstandards if at least one method found in literature isa standard or based on a standard and the standardis not in draft version. Note that the status of thecompatibility can quickly change with new acceptedstandards or new proposed methods.

When access control is enforced at a central entityor at the border of the mesh network, the system is notable to deny the forwarding of packets coming fromunauthorized mesh clients. Therefore, these methodscreate DoS vulnerability in the network. Furthermore,in the case of central access control enforcement, thenetwork is not scalable, because the central accesscontrol enforcement unit becomes a bottleneck.

When a central authentication server is used withreactive authentication, the round trip time of themessage exchanges of the authentication protocol canbe too long such that the QoS aware services cannottolerate that. Besides that, if the authentication serveris DoS attacked, no authentication can be performedduring the handoff in the entire network. Theseproblems are solved when local authentication serversare used, but then the problem is that those serversreside in the mesh network and they can be attackedand compromised physically.

Distributed access control enforcement with proac-tive authentication methods satisfy all the require-ments. However, not all parts of the connection keydistribution process is handled in a standardized waywhen the key distribution process is server driven. In

Copyright c© 2008 John Wiley & Sons, Ltd.Prepared using wcmauth.cls

Wirel. Commun. Mob. Comput. 00: 1–25 (2008)DOI: 10.1002/wcm

Page 12: Securing Multi-operator Based QoS-aware Mesh …09wcmc.pdfWIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 00: 1–25 (2008) Published online in Wiley InterScience

12 I. ASKOXYLAKIS, B. BENCSATH, L. BUTTYAN, L. DORA, V. SIRIS, D. SZILI, I. VAJDA

Table III. Requirements and authentication methods

Fast

(re)

auth

entic

atio

nm

etho

d

DoS

resi

stan

ce

Com

patib

ility

with

stan

dard

s

Scal

abili

ty

No

sing

letr

uste

den

tity

Central access control enforcement 3 7 3 7 3Boundary access control enforcement 3 7 3 3 3

Dis

trib

uted

AC

E* Reactive Remote auth. server 7 7 3 7 3

Reactive Local auth. server 3 3 7 3 7

AS driven†, proactive Authentication server‡ 3 3 7 3 3

Mesh client driven, proactive Authentication server‡ 3 3 3 3 3Reactive Access point 3 3 3 3 7

AS driven†, proactive Access point 3 3 7 3 7Mesh client driven, proactive Access point 3 3 7 3 7

* ACE – Access control enforcement† AS – Authentication server‡ Remote or local authentication server

the case of mesh client driven proactive authentication,the proposed mechanisms often require conditions thatare difficult to satisfy (e.g., multiple radio interfaces inmesh clients).

The requirement of no single trusted entity is notsatisfied when the previous access point authenticatesthe mesh client during or before the handoff, becausean access point must trust the previous access point asan authenticator even if it belongs to another operator.

6. Protection of wireless communications

Wireless communications between mesh clients andmesh routers, as well as among mesh routers andgateways must be protected against various attacks.The main options for the protection of networkcommunications are the following:

• End-to-end protection: In this case, the infor-mation is protected from the mesh client to theother endpoint of the communication, which canbe located within the Internet or within the meshnetwork.

• Link-by-link protection: In this case, theinformation is protected only on the wirelesslinks between the mesh routers, as well as

between the mesh client and the access point.Different protection mechanisms can be appliedon each link.

• Protection of route segments: This solution issomewhere between link-by-link and end-to-end protection. In this case, the information isprotected on a segment of the route betweenthe mesh client and the other endpoint of thecommunication. This can be useful if parts ofthe mesh network can be considered as trustedand the protection needs to be applied only inthe untrusted parts.

6.1. End-to-end protection

The easiest way to implement communication securityservices is to use end-to-end protection solutions.End-to-end protection in this case means that themesh client uses cryptographic methods (e.g., messageauthentication codes, encryption, etc.) to protect itstraffic and the other endpoint, an Internet host or atarget in the mesh network, checks the necessary fieldsand does the appropriate inverse operations.

This method has the following properties:

• It is transparent to the mesh routers, hence,there is no need to modify any mesh-internalelements.

Copyright c© 2008 John Wiley & Sons, Ltd.Prepared using wcmauth.cls

Wirel. Commun. Mob. Comput. 00: 1–25 (2008)DOI: 10.1002/wcm

Page 13: Securing Multi-operator Based QoS-aware Mesh …09wcmc.pdfWIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 00: 1–25 (2008) Published online in Wiley InterScience

SECURING MULTI-OPERATOR BASED QOS-AWARE MESH NETWORKS 13

• The mesh routers cannot check the integrity ofthe packets while they are in-transit. This meansthat any modified, spoofed or fabricated packetis only detectable at the endpoint, therefore,there is an elevated risk for unwanted trafficthroughout the mesh network, which may leadto a DoS situation.

• End-to-end protection can cover the path withinthe Internet (from the gateway to the endsystem), not just in the mesh network. As themesh network operator cannot protect the trafficon the Internet, only in his limited reach, theend-to-end protection is the only possibilitywhen such coverage is needed.

• The endpoints must support the protectionmethod and should use an up-to-date and secureimplementation. This can be problematic, as theend systems are typically owned by end users.

In the case of full end-to-end protection, thenetwork traffic between the mesh clients and the endsystems (inside the mesh or in the Internet) can beprotected by application level solutions, such as TLS[33] or SSH [34]. Alternatively, a network sublayercan also be introduced to provide general securityservices for all network traffic. For this purpose, off-the-shelf VPN (Virtual Private Network) tools areavailable. The most frequently used solution is anIPsec [35] connection between the endpoints.

6.2. Link-by-link protection

Link-by-link protection is the other extreme of theavailable approaches. It means that the informationwithin the mesh network is protected hop-by-hop,including the link between the mesh client and theaccess point, and the links between the mesh routers.On every link, the operator or the two operators thatshare the link can decide what protection mechanisms,algorithms and keys are used, or even, what part of thetraffic should be protected with such measures.

The main advantage of link-by-link protection isthat the level of protection and the mechanisms usedcan be different on each link. Thus, depending on theproperties of the link, the algorithms and parametersmight be adjusted. In addition, link level protection istransparent to the endpoints, and it can also providehelp against traffic analysis.

The main drawback is that the information isnot protected from the mesh routers, therefore, theyshould be all trusted, if only link-by-link protectionis used. Considering that mesh routers are physically

not protected and that dishonest operators can beattackers, the assumption that all routers are trusted isnot realistic. Hence, link-by-link protection should becomplemented with end-to-end protection measures orroute segment protection.

On the other hand, link-by-link protection is indis-pensable for the prevention of traffic analysis and forthe avoidance of bandwidth consumption DoS attacks.In particular, link-by-link encryption can protectnetwork meta-data, such as high level addresses andnames, from disclosure to external attackers, and link-by-link integrity protection can help to detect modifiedor spoofed packets immediately, and therefore, it helpsto avoid that modified or spoofed packets eat upnetwork bandwidth in the mesh network. Note thatwhen only end-to-end integrity protection is used,modified and spoofed packets are detected only at theend systems, and they can cause reduced QoS or evena DoS situation for the users.

Link level protection should be based on standardcryptographic algorithms, such as HMAC [36] forintegrity protection and AES [37] for encryption. Theencapsulation of the packets can use a proprietarymethod or it can use standardized protocols (e.g.,those described in the IEEE 802.11s standard [38]),depending on the wireless networking technologyused. For the protection of the link between the meshclient and the access point, standard solutions basedon WPA or WPA2 [39] should be used.

An important part of the integrity protection isthe protection against replays. This can be achievedby using sequence numbers and flow identifiers,and including them implicitly or explicitly in theMAC computation. In fact, such sequence numbersand flow identifiers may already be available inthe packets depending on the packet format of thenetworking protocols used. Otherwise, the packetsmust be extended with additional header fields that cancarry sequence numbers and flow identifiers.

6.3. Route segment protection

Between end-to-end and link-by-link protectionmethods, there are other scenarios where only asegment of the communication path is protected,which can be very useful in a multi-operatorenvironment:

• Protection only between the client and theaccess point: Considering that the networkoperators might use directional antennasbetween the mesh routers, the most vulnerable

Copyright c© 2008 John Wiley & Sons, Ltd.Prepared using wcmauth.cls

Wirel. Commun. Mob. Comput. 00: 1–25 (2008)DOI: 10.1002/wcm

Page 14: Securing Multi-operator Based QoS-aware Mesh …09wcmc.pdfWIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 00: 1–25 (2008) Published online in Wiley InterScience

14 I. ASKOXYLAKIS, B. BENCSATH, L. BUTTYAN, L. DORA, V. SIRIS, D. SZILI, I. VAJDA

place against network sniffing is the wirelesslink between the mesh client and the accesspoint. Therefore, this link needs specialattention.

• Protection on those parts of the mesh networkthat belongs to other network operators:Depending on the trust between the mesh clientand the network operator, a client may considerthe operator’s access points and mesh routersas secure enough. However, in a multi-operatorbased mesh network, it is possible that someparts of the client’s traffic is handled by meshrouters that belong to other network operators.If the client’s trust is lower in those operators,then it is possible to protect the traffic only inthose foreign parts of the network.

• Protection between the client and the gateway:Beyond the gateway, the Internet may beconsidered as a more secure environment, asthe links are generally physically protected.Therefore, the packets may only be protectedwithin the mesh network from the mesh clientup to the gateway.

• Protection between the client and a trafficaggregation point outside of the mesh network:One typical goal of a mesh network is to providelarger bandwidth to the customers than it wouldbe possible with a single link. For this reason,packets belonging to a single flow may be sentthrough multiple gateways, and then aggregatedinto a single flow again at some aggregationpoint within the Internet. In this case, thecommunication between the aggregator and themesh client can be protected based on standardprotocols such as IPsec [35].

Note that route segment protection inherits some ofthe drawbacks of end-to-end protection. In particular,if the integrity of the packets can only be verifiedat the endpoints of the route segment, then modifiedor spoofed packets may waste valuable networkresources, and thus, degrade the QoS provided to theusers. In order to address this problem, one could usea broadcast authentication scheme, for instance digitalsignature, to ensure that the authenticity and integrityof the packets can be verified by the intermediatenodes on the route segment, while the encryptioncan still be used between the endpoints of the routesegment. Furthermore, in order to avoid the increasedoverhead caused by the verification of the digitalsignatures, this approach can be used in a probabilisticmanner, or it can be turned on only if a large number

of modified or spoofed packets are detected at theendpoints of the route segment.

6.4. Protection against traffic analysis

As we said before, link-by-link encryption is aneffective approach against traffic analysis, as anadversary sniffing the traffic of a wireless link isunable to distinguish between the traffic of theindividual clients and cannot access traffic meta-information (e.g., IP addresses and TCP port numbers)that would reveal the identity of the service providerand the kind of service used. However, if the meshnetwork has a low amount of traffic, then the encrypteddata may still provide useful private information forthe attacker.

As an additional measure, dummy traffic mightbe used for the protection against traffic analysis.This means that the mesh clients and the meshrouters can continuously send dummy packets throughthe wireless links. The attacker cannot distinguishbetween dummy packets and encrypted networktraffic, therefore, this solution protects against trafficanalysis. A drawback of this approach is theunnecessary traffic generated and transported over thenetwork, however, to solve this problem, the dummytraffic can be suppressed if the network links becometoo busy.

7. Secure routing

The problem of routing in wireless mesh networks issimilar to that in mobile ad hoc networks (MANETs),as both types of network use multi-hop wirelesscommunications. For this reason, MANET routingprotocols have been considered for mesh networksboth in academic and in industry circles. For instance,the IEEE 802.11s working group defined two routingprotocols for 802.11 based mesh networks, and bothare based on protocols proposed earlier for MANETs:the default routing protocol in the 802.11s standardis a variant of the AODV (Ad-hoc On-demandDistance Vector) protocol [40], and an optional routingprotocol is also defined that is a variant of the OLSR(Optimized Link-State Routing) protocol [41]. In theremainder of this section, we assume that the readerhas some basic knowledge about routing in MANETsand in mesh networks; more information on thesetopics can be found in [42] and [43], respectively.Our objective is to identify how mesh network routingdiffers from MANET routing with respect to security,

Copyright c© 2008 John Wiley & Sons, Ltd.Prepared using wcmauth.cls

Wirel. Commun. Mob. Comput. 00: 1–25 (2008)DOI: 10.1002/wcm

Page 15: Securing Multi-operator Based QoS-aware Mesh …09wcmc.pdfWIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 00: 1–25 (2008) Published online in Wiley InterScience

SECURING MULTI-OPERATOR BASED QOS-AWARE MESH NETWORKS 15

and to give an overview on the design options forsecuring mesh network routing protocols.

The main differences between MANETs andmesh networks that are relevant for routing are thefollowing:

• The nodes in MANETs are mobile and, hence,battery powered. In mesh networks, the meshclients can be mobile and battery powered, butthe mesh routers are mainly static and they areconnected to some power supply. Therefore,mesh routers are less constrained in terms ofenergy consumption than MANET nodes are.

• In MANETs, it is often assumed that any twonodes may want to communicate with eachother. In contrast to this, mesh networks areoften used as access networks through which themesh clients connect to the Internet, meaningthat the bulk of the communication is betweenmesh clients and gateway nodes, resulting ina more specific traffic pattern than the trafficpattern in MANETs. In addition, in meshnetworks, a flow originating from a single meshclient can be split and routed towards multiplegateways, while this type of multi-destinationrouting is less common in MANETs.

• In MANETs, routing is best effort, and QoSissues are usually not addressed, while in meshnetworks, many of the envisioned applicationsrequire QoS support from the routing protocol.Therefore, mesh network routing protocols areoptimized for performance and reliability, andthey use more complex routing metrics than thehop-count, which is the most commonly usedmetric in MANET routing protocols.

In addition to these general differences, we must alsomention that MANETs are often considered to befully self-organized, where each node is owned andadministered by a different entity, while in this paper,we consider operator based mesh networks, where agroup of mesh routers are owned and administered bya single entity (however, we assume the co-existenceof multiple operators). This is not a general differencebetween MANETs and mesh networks, becauseMANETs can also belong to a single administrativedomain (e.g., in military applications), and communitybased mesh networks may also be fully self-organized.

Based on the observations made above, we identifythe following main differences between the securityof mesh network routing and MANET routing: Firstof all, while the security requirements are moreor less the same, in mesh network routing, QoS

support mechanisms need to be protected againstattacks, and in particular, the protection of routingmetric values and metric computation against attackslaunched by misbehaving mesh routers needs somespecial attention. Second, the security mechanismscan be different, in particular, in mesh networks,we can take advantage of the fact that the meshrouters have no energy constraints and can run morecomplex cryptographic algorithms than the nodes inMANETs. Finally, in operator based mesh networks,the establishment of security associations between themesh routers is easier, as the necessary cryptographicmaterial can be distributed and managed by theoperators in a systematic way. For instance, the usageof public key cryptography and the assumption of apublic key infrastructure run by the operators do notseem to be far fetched.

Surveys on securing MANET routing protocols canbe found in [44] and in Chapter 7 of [45]; here,we focus on the differences identified above, andnot covered by those surveys. More specifically, weaddress the protection of the routing metric valuesin reactive distance vector routing protocols and inproactive link-state routing protocols, as well as thesecurity issues in resource reservation and in errorrecovery mechanisms. We do not address specificattacks on routing identified earlier in the literature,such as wormholes [46] and rushing [47], becausethose are not unique to mesh networks and theyare extensively covered by the literature on MANETrouting security.

7.1. Securing the route discovery

We discuss the security of the route discovery phase oftwo types of routing protocols: reactive distance vectorrouting and proactive link-state routing. Reactivedistance vector routing protocols (e.g., AODV)discover routes in an on-demand manner by floodingthe entire network with a route request message.Among other things, this route request messagecontains an aggregated routing metric value that isupdated by each node that processes the message, andthat represents the routing metric of the path takenby this particular copy of the message. When thenodes process a route request message, they updatethe routing entry that corresponds to the initiatorof the route discovery by setting the routing metricvalue of the entry to the aggregated routing metricvalue observed in the request. Intermediate nodes thatknow a path to the destination and the destinationitself can respond to a route request by sending a

Copyright c© 2008 John Wiley & Sons, Ltd.Prepared using wcmauth.cls

Wirel. Commun. Mob. Comput. 00: 1–25 (2008)DOI: 10.1002/wcm

Page 16: Securing Multi-operator Based QoS-aware Mesh …09wcmc.pdfWIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 00: 1–25 (2008) Published online in Wiley InterScience

16 I. ASKOXYLAKIS, B. BENCSATH, L. BUTTYAN, L. DORA, V. SIRIS, D. SZILI, I. VAJDA

unicast route reply message back on the reverse pathtaken by the request. Similar to the route request, theroute reply message contains an aggregated routingmetric value too that is updated by each node thatprocesses the message. When the nodes process aroute reply message, they update the routing tableentry that corresponds to the destination of the routediscovery by setting the routing metric of the entryto the aggregated routing metric value observed in thereply.

In proactive link-state routing protocols (e.g.,OLSR), each node periodically floods the networkwith link-state update messages that contain thecurrent link quality metric values observed by thenode on all of its links. Based on the received link-state update messages, each node can reconstruct theconnectivity graph of the network, where the edges arelabeled with the link quality values. Then, each nodecan select the appropriate path to any other node inthe network using various path selection algorithmslocally.

In order to prevent the manipulation of the routingmessages, and thus, the creation of incorrect routingstate by an external adversary, the routing messagesmust be authenticated and their integrity must beprotected. This can be easily achieved by usingstandard cryptographic techniques including digitalsignatures and message authentication codes (MACs).Digital signatures provide broadcast authenticationservices meaning that all nodes in the network canverify the authenticity of a signed message. Forthis, the public keys of the potential signers mustbe distributed to the verifiers securely in an off-line manner. In case of MACs, only those nodescan verify the authenticity of a message carryinga MAC value that possess the secret key used forgenerating that value. This requires the nodes tosecurely establish shared secret keys between eachother. Routing messages can be protected either witha key shared by all nodes in the network or on alink-by-link basis using keys shared by neighboringnodes; both approaches prevent an external adversaryfrom manipulating the routing messages. However, thedisadvantage of relying on a common key shared by allnodes is that if a single node is compromised, then theentire system collapses. For this reason, either digitalsignatures should be used, or routing messages shouldbe authenticated with MACs on a link-by-link basisusing pairwise shared keys.

Reactive distance vector routing. The difficulty ofsecuring reactive distance vector routing protocols

lies in the protection against misbehaving routers. Inparticular, the difficulty is that the routing messagescontain aggregated routing metric values that arelegitimately manipulated by the nodes that processthose messages. Hence, a misbehaving router canincorrectly set the aggregated routing metric valuein a routing message, and there is no easy way forthe other routers to detect such a misdeed. Note thatauthentication of routing messages does not help tosolve this problem.

Recall that we are interested in QoS-aware routingfor mesh networks. Here, the aggregated routingmetric value of a path is computed from the linkquality metric values that correspond to the linksof that path. There are various link quality metricsproposed in the literature for mesh networks; mostof them are based on general quality metrics such asbandwidth, delay, jitter, bit error rate, etc. However,all known link quality metrics fall in either of thefollowing three classes: (a) additive, (b) multiplicative,and (c) transitive metrics. In case of additive metrics,the aggregated routing metric of a path is computedas the sum

∑i xi of the link quality metric values xi.

Examples for such metrics are the delay, the jitter, andalso the hop-count. In case of multiplicative metrics,the aggregated routing metric is computed as theproduct

∏i xi of the link quality metric values. An

example for such a metric is the bit error rate. Finally,in case of transitive metrics, the aggregated routingmetric is either the minimum mini xi or the maximummaxi xi of the link quality metric values. A transitivemetric where the minimum is used is the bandwidth.

We make the observation that multiplicative metricscan be transformed into additive metrics by taking thelogarithm of the metric values: log

∏i xi =

∑i log xi.

Similarly, any transitive metric that uses the minimumcan be converted into a transitive metric that uses themaximum by multiplying the metric values with −1:−mini xi = maxi(−xi). Therefore, it is sufficient todevelop protection techniques for either additive ormultiplicative metrics, and for the transitive metricthat uses either the minimum or the maximum.

In addition, another observation is that routingmetrics are usually monotonic, meaning that eitherf(X, x) ≤ X or f(X,x) ≥ X for any aggregatedmetric value X and any link quality metric valuex, where f denotes the aggregation operator (i.e.,addition, multiplication, minimum, or maximum).Clearly, the minimum and the maximum are alwaysmonotonically decreasing and increasing, respectively.Moreover, if the link quality metric values are non-negative, then additive metrics are monotonically

Copyright c© 2008 John Wiley & Sons, Ltd.Prepared using wcmauth.cls

Wirel. Commun. Mob. Comput. 00: 1–25 (2008)DOI: 10.1002/wcm

Page 17: Securing Multi-operator Based QoS-aware Mesh …09wcmc.pdfWIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 00: 1–25 (2008) Published online in Wiley InterScience

SECURING MULTI-OPERATOR BASED QOS-AWARE MESH NETWORKS 17

increasing, while if link quality values are non-positive, then additive metrics are monotonicallydecreasing. Similarly, if the link quality metric valuesare not smaller than one, then multiplicative metricsare monotonically increasing, while if they are notgreater than one, then multiplicative metrics aremonotonically decreasing.

Monotonic routing metrics can be protected againstmanipulation by misbehaving routers using hashchains. More specifically, hash chains can be usedto protect monotonically increasing metrics againstmalicious decrease, and monotonically decreasingmetrics against malicious increase. A detailed descrip-tion of using hash chains in routing protocols canbe found in [48]. The basic idea is that the routingmessages contain a cryptographic hash value, andeach node i that processes a routing message updatesthis hash value by hashing it further iteratively qi

times with a publicly known cryptographic hashfunction, where qi corresponds to the link qualitymetric value with which the aggregated routing metricvalue is being increased or decreased. Thus, in order todecrease a monotonically increasing, or to increase amonotonically decreasing metric value, a misbehavingrouter should be able to compute pre-images of thehash value found in the routing message, and thisis computationally infeasible, due to the one-wayproperty of cryptographic hash functions.

While hash chains are efficient and easy to use, theyhave some limitations, the most serious one being thatthey can protect against either increase or decrease,but not against both. One can argue that if pathswith smaller routing metric values are preferred, thenit is sufficient to protect against malicious decreaseof the aggregated routing metric value, while ifpaths with larger metric values are preferred, thenit is sufficient to protect against malicious increase.Malicious modifications made in the other directionmake a path less attractive, and they may result in asituation, where a given path is finally not selectedwhen it should have been selected if there was nomisbehaving router on the path. While in theory, thiscan be considered to be an attack, in practice, suchattacks have little and uncontrolled effects, and hence,they are not very likely to happen.

The protection of the hop-count needs some specialattention in case of QoS aware mesh network routing.The hop-count is a monotonically increasing metric,and thus, the hash chain approach can be used toprotect it against malicious decrease. This is usefulif the hop-count is used directly as a routing metric.However, the hop-count can also be used to compute

the average of some link quality metrics. For this,besides the aggregated routing metric computed asthe sum of the link quality metric values, routingmessages must also contain the hop-count, and inorder to obtain the average, the aggregated routingmetric value must be divided with the hop-count value.In this case, however, the hop-count must also beprotected against malicious increase, because largerhop-count values result in a smaller average value, andthis increases the probability of incorrectly selectingthe corresponding path. The protection of the hop-count against malicious increase is a requirementthat is unique to QoS aware mesh network routingprotocols that rely on the average of the link qualityvalues, and it is not addressed by secure MANETrouting protocols. Indeed, at the time of this writing,protection of the hop-count against malicious increaseseems to be an open research problem.

Another problem with passing on only aggregatedrouting metric values in routing messages is that arouter on a path cannot verify if the previous routerused a correct link quality metric value to update theaggregated routing metric value in a routing message.Assuming that links are symmetric, the two end-pointsof a link observe the same quality metric value on thatlink, and if at least one of them is not misbehaving,then it can detect if the other end-point misbehaves,given that it can observe which link quality value isused by the other end-point. Hence, the possibility ofmaking this observation must be ensured by securedistance vector routing protocols designed for meshnetworks. One approach to achieve this is delaying theaggregation of link quality values: each node puts inthe message (and authenticates) the link quality valuethat it wants to use, the next node verifies (and re-authenticates) that value, and inclusion of that valueinto the aggregated routing metric value happens onlyafter this verification possibly by a third node on thepath. Note that if links are not symmetric, and onlyone router can make a statement about the quality ofa given link (in one direction), then there is no way todetect misbehaving routers.

Examples for secured reactive distance vectorrouting include S-AODV [49] (Secure AODV)and ARAN [50] (Authenticated Routing for Ad-hoc Networks). However, none of these protocolsconsider QoS-aware routing metrics. In addition, S-AODV lacks neighbor authentication, which makes itvulnerable to spoofing attacks. The detailed analysisof these protocols can be found in [51].

Copyright c© 2008 John Wiley & Sons, Ltd.Prepared using wcmauth.cls

Wirel. Commun. Mob. Comput. 00: 1–25 (2008)DOI: 10.1002/wcm

Page 18: Securing Multi-operator Based QoS-aware Mesh …09wcmc.pdfWIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 00: 1–25 (2008) Published online in Wiley InterScience

18 I. ASKOXYLAKIS, B. BENCSATH, L. BUTTYAN, L. DORA, V. SIRIS, D. SZILI, I. VAJDA

Proactive link-state routing. Proactive link-staterouting protocols are much easier to secure, becausethe link-state update messages do not containaggregated routing metric values, and hence, they donot need to be modified by the nodes that re-broadcastthem. Instead, each node collects link quality metricvalues from the entire network, and aggregates themlocally during the path computation. A statementabout the link qualities of a node can be authenticatedby the node using a broadcast authentication scheme(e.g., digital signature). In addition, those statementscan be verified and countersigned by the neighborsof the node. This simplicity is intriguing and makeslink-state routing protocols a preferred choice whensecurity issues are considered.

Security extensions to the OLSR protocol basedon similar ideas described above are proposed in[52]. However, that proposal lacks the verificationand countersignature of the link quality statements bythe neighboring nodes. Conflicting statements about alink can still be detected by the nodes, but they areunnecessarily flooded in the entire network.

7.2. Securing resource reservations

Once an available path that satisfies the required QoSrequirements is discovered, reserving resources onthat path is a simple matter: a resource reservationrequest can be sent along that path. This requestmust be authenticated by its originator in order toprevent an external attacker from sending spoofedreservation requests. In addition, some rate limitingmechanism should be used to limit the amount ofresources that a single node can reserve in a givenperiod of time. This is a protection measure againstmisbehaving nodes that try to exhaust all resourcesavailable on a path by reserving them. As requestsare authenticated, such rate limiting is straightforwardto implement by tracking the reservations made by agiven node. Reservations can be released as a resultof sending and processing explicit reservation releasemessages that must also be authenticated. Moreover,reservations should also be released if the reservedresources are not actually used for a certain period oftime.

7.3. Design issues of error recoverymechanisms

Routing protocols usually have built-in error recoverymechanisms that can handle the situation of linkbreakage. However, those mechanisms are often

limited to sending an error message along theremaining segments of a broken path, which informsthe involved nodes that the given path is nolonger functioning. Then, the usual action is that analternative path is selected that does not contain thebroken link. If no such path is available, then an entirenew route discovery must be executed. This opens thedoor for DoS attacks, where the attacker forces therepeated execution of the route discovery algorithm,which results in a substantially increased overhead(due to flooding), and hence, increased interferenceand decreased QoS for a potentially large number ofnodes in the network.

In order to address this problem, the error recoverymechanism should try to repair a broken path locallywithout the need to flood the entire network. Link-staterouting protocols are advantageous again, becauseeach node has a full view of the network graph, andhence, any node on a broken path can locally identifydetours avoiding the broken link. We are not aware,however, of any specific link-state routing protocolfor mesh networks that uses such a local route repairmechanism.

8. Key management

As we have seen, securing the operation ofmesh networks requires the usage of cryptographicmechanisms, which rely on cryptographic keys. Keymaterial is needed for the protection of wirelesscommunications within the mesh network (includingthe communication between the mesh clients andthe access points), for the protection of the routingprotocol, for the protection of the messages of themesh client authentication protocol, and potentially,for mesh client authentication itself if it is not basedon simple passwords.

Given that in a multi-operator environment, securityassociations are often established between entities thatbelong to different administrative domains, a PKIbased key management approach seems to be theconceptually simplest and most convenient solutionhere. Although, a PKI-based approach may seem tobe heavy for the first sight, it may, in fact, be feasible,because here we do not require a global and generalpurpose PKI. We require only that the operators ofthe mesh network set up their own PKI, which isused only for setting up security associations betweendevices. Such localized solutions are routinely usedtoday by organizations for setting up Virtual PrivateNetworks. Also, human users need to be equippedwith certificates only in the case when they are

Copyright c© 2008 John Wiley & Sons, Ltd.Prepared using wcmauth.cls

Wirel. Commun. Mob. Comput. 00: 1–25 (2008)DOI: 10.1002/wcm

Page 19: Securing Multi-operator Based QoS-aware Mesh …09wcmc.pdfWIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 00: 1–25 (2008) Published online in Wiley InterScience

SECURING MULTI-OPERATOR BASED QOS-AWARE MESH NETWORKS 19

authenticated using a signature based authenticationmethod.

A PKI for multi-operator based mesh networkscould be established in a rather straightforward way:Each operator runs its own Certification Authority(CA) service that issues certificates for the publickeys of the mesh routers, the access points, thegateways, and the various servers (e.g., those handlingmesh client authentication) operated by the givenmesh network operator. Some of the operatorsmay use public key cryptographic protocols for theauthentication of their customers, in which case, theCAs of those operators issue certificates for the meshclients’ public keys too. Mesh routers, access points,gateways, servers, and mesh clients store their owncertificates, and the public key of their CA. In addition,the CAs of the different operators cross-certify thepublic key of each other on a bilateral basis. Theresulting certificates are stored in a publicly availablestorage, or alternatively, each mesh router, accesspoint, gateway, and server can periodically downloadand locally store the certificates issued by its CA forthe public keys of the other CAs.

Given such a PKI, any two entities, say A and B,can easily establish a shared key. For this, each of themcan send its public key certificate to the other. A canverify B’s certificate using the certificate issued by A’sCA for the public key of B’s CA, and the public keyof A’s CA. B can verify A’s certificate in a similarmanner. Once they have obtained each other’s publickey, A and B can run any public key based sessionkey establishment protocol (see [53] for an extensivediscussion of available protocols) to establish a sharedsecret. Moreover, any entity A can generate digitalsignatures, which can be verified by all other entitiesusing the public key of A, which can be obtained andverified as described above.

Each CA can renew certificates on a regular basisdepending on its own security policy. In addition, eachCA can maintain a certificate revocation list (CRL)where it publishes revoked certificates. Each operatorcan obtain the CRL of all the other operators, anddistribute all CRLs to its mesh routers, access points,gateways, and servers. Mesh clients can obtain CRLsfrom access points when they connect to them.

9. Intrusion detection and recovery

Intrusion detection involves the automated identifi-cation of unusual activity by collecting audit data,and comparing it with reference data. A primaryassumption of intrusion detection is that a network’s

normal behavior is distinct from abnormal or intrusivebehavior. Various approaches to intrusion detectiondiffer in the features (or measures/metrics) theyconsider, in addition to how and where these featuresare measured. Identifying the features to be monitoredis important, because the amount of monitored datacan be particularly large, and its collection canconsume a significant amount of wireless resources.

Intrusion detection procedures can be classifiedinto three categories [54]: misuse (or signature-based)detection, anomaly detection, and protocol-based (orspecification-based) detection. The three categoriesdiffer in the reference data that is used for detectingunusual activity: misuse detection considers signaturesof unusual activity, anomaly detection considers aprofile of normal behavior, and specification-baseddetection considers a set of constraints characterizingthe normal behavior of a specific protocol or program.

Intrusion detection in wireless mesh networksimposes additional challenges compared to intrusiondetection in wired networks, due to variations andimpairments of the wireless channel, the broadcastand open access nature of the wireless spectrum,the interference between wireless links, and thelimited physical protection of the network nodes. Forexample, in an operator’s wired network it is sufficientto implement intrusion detection in the edge switchesor routers, which connect to external devices, andphysically protect internal network devices. On theother hand, in wireless mesh network the previousdifferentiation of internal and edge devices is useless,since all mesh nodes, including those without links toexternal devices, can be affected by external sourcesdue to the broadcast nature of the wireless spectrum.

Intrusions into wireless networks often aim atDenial-of-Service at different layers including thephysical, MAC, and network layers [55]:

• Physical layer: The simplest form of a physicallayer attack is a continuous jammer, whichgenerates a continuous high power signalacross the entire channel bandwidth. Anotherpossibility is to transmit a periodic or randomsignal [56, 57].

• MAC layer: Attacks in this layer are referredto as virtual jamming, and involve transmittingspurious or modified MAC layer control(RTS, CTS, ACK) or data packets. Virtualjamming attacks can also be conducted bymanipulating the NAV (Network AllocationVector) value of control and data packets, thusinfluencing a well-behaving node’s backoff.

Copyright c© 2008 John Wiley & Sons, Ltd.Prepared using wcmauth.cls

Wirel. Commun. Mob. Comput. 00: 1–25 (2008)DOI: 10.1002/wcm

Page 20: Securing Multi-operator Based QoS-aware Mesh …09wcmc.pdfWIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 00: 1–25 (2008) Published online in Wiley InterScience

20 I. ASKOXYLAKIS, B. BENCSATH, L. BUTTYAN, L. DORA, V. SIRIS, D. SZILI, I. VAJDA

Such actions can be performed in a continuous,periodic or random, or intelligent (channeland protocol-aware) manner [58, 56, 57, 59].Intelligent attacks utilize the semantics of datatransmission, and have the advantage of usingless energy compared to continuous jammingattacks.

• Network layer: Attacks in this layer involvesending spurious routing messages, modifiedrouting information, or tampering with packetforwarding.

Note that attacks can be performed in multiple layersor from multiple locations simultaneously, makingthem stealthy hence harder to detect. In addition,attacks can also target the transport layer and higher,however, such attacks can be handled in a mannersimilar to wired networks.

9.1. Related work

A distributed and cooperative architecture for anomalydetection is presented in [60, 61]. This work relies oncharacterizing normal behavior using an information-theoretic metric: entropy and conditional entropy.The anomaly detection approach is evaluated foridentifying routing attacks, and considers multiplefeatures that correspond to manipulating routinginformation and influencing the packet forwardingbehavior.

The work in [62] considers the combination ofmultiple features, such as route additions, removals,repairs, and traffic related features such as packet inter-arrivals, to detect routing attacks. The work in [63]considers the route lifetime and frequency of routingevents to detect abnormal behavior.

The work in [64] detects MAC-layer misbehaviorbased on the sequential probability ratio test, whichis applied to the time series of backoff times; thelatter are estimated using timestamps of RTS/CTS andacknowledgement packets. MAC-layer misbehaviordetection is also the focus of [65], which considersa protocol-based approach that relies on detectingdeviations of the values of MAC-layer parameters,such as inter-frame spacing, NAV, and backoff.

Prior work has shown the need for cross-layer andcross-feature intrusion detection. In particular, [56]shows that single metrics, such as the signal strength,packet delivery ratio, or channel access time, aloneare not able to effectively detect wireless jamming.On the other hand, combining packet delivery ratiomeasurements with signal strength measurementsor location information can detect attacks ranging

from continuous physical layer jamming up toreactive jamming where the attacker transmits ajamming signal only when he detects the existenceof a legitimate transmission. The work in [66]considers the combination of measurements such asthe physical carrier sense time, the rate of RTS/CTStransmissions, the channel idle period, and the numberof transmissions together with the channel utilizationtime to demonstrate that the combination of suchcross-layer metrics can improve detection. Both theabove two approaches consider simple thresholdschemes for signaling a potential attack.

9.2. Unique features of wireless mesh networks

Wireless mesh networks have some common char-acteristics with wireless ad hoc networks, namelyrouting and forwarding over wireless multi-hop paths,hence approaches for intrusion detection in wirelessad hoc networks are relevant. Nevertheless, thereare important differences, which affect both theprocedures for intrusion detection and the actions forrecovery.

Fixed mesh nodes and relatively stable topology.Unlike ad hoc networks, where nodes are typicallymobile, in wireless mesh networks nodes are typicallystationary. This has two implications: First, locationinformation can be used for intrusion detection.Second, unlike ad hoc networks, wireless meshnetworks have a relatively stable topology, whichchanges in the case of node failures or additions,interference, and security attacks. The reducedvariability due to the stable topology yields lessoverhead for statistical anomaly detection approachesthat require (re-)estimating the normal behavior whenthe network topology changes. Moreover, fixed meshnodes typically contain higher processing and storagecapabilities and have an available power supply, thusreducing the burden for estimating the normal trafficbehavior compared to resource (processing, storage,and battery) constrained mobile devices.

Interconnection to a wired infrastructure andcentralized management. Ad hoc networks havea dynamically varying topology with no fixedinfrastructure and no centralized control. On the otherhand, wireless mesh networks have a number ofgateways connected to a wired network infrastructure;the existence of multiple gateways provides higherprotection to intrusion attacks. Moreover, operator-owned mesh networks have centralized management.

Copyright c© 2008 John Wiley & Sons, Ltd.Prepared using wcmauth.cls

Wirel. Commun. Mob. Comput. 00: 1–25 (2008)DOI: 10.1002/wcm

Page 21: Securing Multi-operator Based QoS-aware Mesh …09wcmc.pdfWIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 00: 1–25 (2008) Published online in Wiley InterScience

SECURING MULTI-OPERATOR BASED QOS-AWARE MESH NETWORKS 21

Centralized management facilitates the collection ofintrusion detection data and results, thus enablingcorrelation of measurements from different monitor-ing locations. Nevertheless, centralized collection andprocessing of all audit data may be too costly due tothe consumption of scarce wireless resources.

Multi-radio, multi-channel, and directional anten-nas. Ad hoc networks, due to the mobility of nodes,typically involve nodes with a single radio connectedto an omnidirectional antenna; moreover, to achieveconnectivity all nodes operate on the same channel.On the other hand, wireless mesh networks involvenodes with multiple radios, each operating in differentchannels. Multi-radio and multi-channel operationresults in less variability, since it reduces – butdoes not eliminate – the interference between linksthat involve different wireless interfaces. Reductionof such interference is also achieved with theuse of directional antennas, which is typical inmetropolitan wireless mesh network deployments.As indicated above, less variability facilitates theapplication of anomaly detection which uses statisticaltechniques for estimating normal mesh networkbehavior. Directional antennas also provide moreresistance to jamming, since they reduce the possiblepositions of an attackers transmitter that can disturbthe wireless communication. Moreover, multi-radioand multi-channel operation, together with directionalantennas can support multiple paths between meshnodes that contain disjoint links; availability of suchmultiple paths can facilitate attack recovery andmitigation, as further discussed in Section 9.4.

9.3. Requirements for intrusion detection

Based on the above discussion, next we identifyrequirements for intrusion detection in wireless meshnetworks. At a high level, these requirements aresimilar to other environments such as wired and ad hocnetworks. Our goal here is to discuss the realization ofthe requirements in wireless mesh networks.

• Cross-feature and cross-layer detection: Com-bining multiple features and measurements(cross-feature) and measurements at differentlayers (cross-layer) can improve the per-formance of intrusion detection systems. Inparticular, for anomaly detection such anapproach can significantly reduce the numberof false positives [56, 66]. Combining multiplefeatures for intrusion detection can be achieved

through a hierarchical or cascaded system:A hierarchical system recursively combinesor fuses multiple alerts, i.e., deviations ofindividual features; such an approach canreduce the number of false positives. In acascaded intrusion detection system, an alert forone feature can trigger a detector for anotherfeature; in addition to reducing the number offalse positives, such an approach also reducesthe overhead of intrusion detection.Possible features (or measures/metrics) atvarious layers that can be used for intrusiondetection include the following:

– Physical layer: signal strength, packetdelivery ratio (or packet error ratio),physical carrier sensing time, locationinformation.

– MAC layer: channel access delay, backofftime, channel idle time, RTS/CTS trans-mission rate, channel utilization.

– Network layer: route update frequency(or route lifetime), route update messagerate, route length. These metrics canbe monitored for each mesh node thatparticipates in routing.

– Application layer: throughput, goodput,delay, jitter.

• Distributed intrusion detection with correlationof measurements from multiple locations: Cor-relation of measurements or detection resultsfrom multiple locations exploits the broadcastnature of wireless transmissions, whereby thetransmission from one node can be receivedby multiple nodes within its range. Combiningmeasurements from multiple monitoring loca-tions can improve the performance of intrusiondetection, by reducing the number of falsepositives, but requires a central entity to collectand combine the measurements from multiplelocations. This suggests a two-layer intrusiondetection system, where processing based onpurely local information is performed in themesh nodes, and the correlation of detectionresults from different monitoring locations isperformed in some centralized entity. Moreover,the above can involve multiple monitors fromdifferent operators.

In addition to the above, general requirements includeeffective intrusion detection, in terms of high detectionprobability, and low false positives and false negatives,

Copyright c© 2008 John Wiley & Sons, Ltd.Prepared using wcmauth.cls

Wirel. Commun. Mob. Comput. 00: 1–25 (2008)DOI: 10.1002/wcm

Page 22: Securing Multi-operator Based QoS-aware Mesh …09wcmc.pdfWIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 00: 1–25 (2008) Published online in Wiley InterScience

22 I. ASKOXYLAKIS, B. BENCSATH, L. BUTTYAN, L. DORA, V. SIRIS, D. SZILI, I. VAJDA

and low overhead for collecting and processingmonitoring data.

9.4. Attack recovery and mitigation

Here, we identify the actions and the correspondingmechanisms that can be used for attack recovery andmitigation, which are triggered by intrusion detection.

• Channel switching: One approach for evadingan attack is channel switching (or channelhopping) [67, 68, 69]. This approach ismotivated by frequency hopping, but differsin that channel switching occurs on-demand,rather than in a predefined or pseudo-randommanner, thus forcing an intruder to jam a muchlarger frequency band. Aside selecting the newchannel to switch to, channel switching requirescoordination between interfaces operating inthe same channel. This coordination issue isdifferent in single-radio wireless mesh net-works, compared to multi-radio mesh networks,where each mesh node contains multiple radiointerfaces operating in different channels.

• Power and rate control: Increasing the trans-mission power or reducing the transmissionrate can increase the energy per bit thatreaches the receiver, which, in turn, increasesthe probability of successful packet decoding.With the former approach, when increasing thetransmission power, care must be taken, as it canalso increase the level of interference inducedon other receiving interfaces.

• Mechanism-hopping: The work of [70] pro-poses a mechanism-hopping approach whichcan be viewed as a generalization and com-bination of channel hopping, and power andrate control, that exploits multiple mechanismsand parameters for each mechanism in alllayers. For example, the physical layer includespower control and rate control/modulation,the link layer includes different mediumaccess mechanisms with different parameters,the network layer includes different routingalgorithms and forwarding strategies, etc.

• Multi-path routing: While channel hoppingexploits channel/frequency diversity, the exis-tence of multiple paths between mesh nodesenables space diversity. Multiple paths can beused to reroute traffic when an intrusion isdetected. With this approach, the detection delayand the rerouting delay determines the impact

of an attack in terms of lost data. Moreover,multiple paths can be used to perform pathhopping, where a path for a particular node pairor flow is randomly switched among multipleavailable paths. In response to an attack, routingcan be used to isolate some portion of the meshnetwork that has been the target of an attack.An alternative approach that can avoid data lossaltogether is to combine multi-path redundancywith network coding. Intrusion detection andrecovery in this context has the objective ofincreasing the redundancy of the mesh networkin order to combat future attacks.

• Multiple wired Internet gateways: Another formof space diversity is the existence of multiplegateways that connect the wireless meshnetwork to a wired network infrastructure. Theexistence of multiple coordinating gateways,through the use of anycasting, can help mitigateintrusion attacks.

Note that the above actions and mechanisms pertainto the physical, link, and network layers which arespecific to wireless mesh networks. These can becombined with higher layer mechanisms, such asfiltering, rate limiting, and caching, to further enhancethe effectiveness of attack recovery and mitigation.

10. Conclusion and future work

In this paper, we addressed the problem of securingQoS-aware mesh networks operated by multiple meshnetwork operators. This is a complex problem domain,therefore, our main objective was to structure it, andto give an overview of the possible design optionsfor a comprehensive security architecture for suchnetworks. For this purpose, we identified an attackermodel and, based on that, we derived the main securityrequirements. Then, we gave a detailed overviewon the state-of-the-art in client authentication andaccess control in wireless networks, and we evaluatedhow the various approaches proposed so far fit therequirements identified for mesh networks. Next,we identified several approaches to protect thecommunication within the mesh network based onstandard communication security mechanisms. Wealso identified possible approaches to secure therouting protocols in mesh networks, and in particularto protect the routing metric values in routingmessages. Finally, we identified possible approachesfor intrusion and misbehavior detection and recoverythat take into account the unique features of mesh

Copyright c© 2008 John Wiley & Sons, Ltd.Prepared using wcmauth.cls

Wirel. Commun. Mob. Comput. 00: 1–25 (2008)DOI: 10.1002/wcm

Page 23: Securing Multi-operator Based QoS-aware Mesh …09wcmc.pdfWIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 00: 1–25 (2008) Published online in Wiley InterScience

SECURING MULTI-OPERATOR BASED QOS-AWARE MESH NETWORKS 23

networks, and we proposed a PKI-based approach tokey management.

We saw that, although, a considerable amount ofrelated work has already been carried out for securingWiFi networks and mobile ad hoc networks, the resultsof those works cannot always be directly used in meshnetworks. In particular, the authentication mechanismsavailable for WiFi networks do not really supportuser mobility, as they do not allow for seamlesshandover between access points, and the majorityof the secure routing protocols proposed for mobilead hoc networks do not support the protection ofQoS-aware routing metrics. In addition, intrusionand misbehavior detection and recovery mechanismsproposed for wired networks and for mobile ad hocnetworks are not optimized for mesh networks; theyshould be adapted to the characteristics of meshnetworks to increase their performance in terms ofeffectiveness and reliability.

In terms of future work, we intend to designand implement a comprehensive security architecturefor multi-operator based QoS aware wireless meshnetworks that satisfies the requirements identified inthis paper and takes into consideration the designchoices that have been reviewed here.

Acknowledgement

This work was supported in part by the EuropeanCommission in the context of the 7th Frame-work Programme through the EU-MESH Project(Enhanced, Ubiquitous, and Dependable BroadbandAccess using MESH Networks, ICT-215320, www.eu-mesh.eu) and in part by the Mobile Innovation Center(www.mik.bme.hu) at the Budapest University ofTechnology and Economics.

References

1. Akyildiz IF, Wang X, Wang W. Wireless mesh networks: asurvey. Computer Networks March 2005; 47(4):445–487.

2. Bruno R, Conti M, Gregori E. Mesh networks: commoditymultihop ad hoc networks. IEEE Communications Magazine2005; 43(3):123–131.

3. Zhang W, Wang Z, Das SK, Hassan M. Security issuesin wireless mesh networks. Wireless Mesh Networks:Architectures and Protocols, Hossain E, Leung KK (eds.),Springer, 2008.

4. Ben Salem N, Hubaux JP. Securing wireless mesh networks.IEEE Wireless Communications April 2006; .

5. Falk R, Huang CT, Kohlmayer F, Sui AF. Security in wirelessmesh networks. Wireless Mesh Networking: Architectures,Protocols and Standards, Zhang Y, Luo J, Hu H (eds.),Auerbach Publications, Taylor & Francis Group, 2006.

6. ChilliSpot - Open Source Wireless LAN Access PointController. http://www.chillispot.info/.

7. Cheikhrouhou O, Laurent-Maknavicius M, Chaouchi H.Security architecture in a multi-hop mesh network. In Proc.5th Conference on Security and Network Architectures (SAR2006), 2006.

8. Khan K, Akbar M. Authentication in Multi-Hop WirelessMesh Networks. World Academy Of Science, Engineering AndTechnology 2006; :178–183.

9. Calhoun P, Montemurro M, Stanley D. CAPWAP ProtocolBinding for IEEE 802.11 October 2008. (work in progress).

10. Zhang Y, Fang Y. A secure authentication and billingarchitecture for wireless mesh networks. Wireless Networks2007; 13(5):663–678, doi:http://dx.doi.org/10.1007/s11276-006-8148-z.

11. Chen JJ, Tseng YC, Lee HW. A Seamless Handoff Mechanismfor IEEE 802.11 WLANs Supporting IEEE 802.11i SecurityEnhancements. IEEE Asia-Pacific Wireless CommunicationsSymposium, Hsinchu, Taiwan, 2007.

12. Chen T, Schafer G, Fan C, Adams S, Sortais M, WoliszA. Denial of service protection for optimized and qos-awarehandover based on localized cookies. Proc. of EuropeanWireless 2004, Barcelona, Spain, 2004.

13. Aura T, Roe M. Reducing Reauthentication Delay inWireless Networks. SECURECOMM ’05: Proceedingsof the First International Conference on Securityand Privacy for Emerging Areas in CommunicationsNetworks (SECURECOMM’05), IEEE ComputerSociety: Athens, Greece, 2005; 139–148, doi:http://dx.doi.org/10.1109/SECURECOMM.2005.58.

14. Mishra A, ho Shin M, Arbaugh WA. Context Caching usingNeighbor Graphs for Fast Handoffs in a Wireless Network.INFOCOM, IEEE, 2004.

15. Narayanan V, Dondeti L. EAP Extensions forEAP Re-authentication Protocol (ERP). RFC5296 (Proposed Standard) Aug 2008. URLhttp://www.ietf.org/rfc/rfc5296.txt.

16. Lopez RM, Skarmeta AG, Bournelle J, Laurent-MaknavicusM, Combes JM. Improved EAP keying framework for a securemobility access service. IWCMC ’06: Proceedings of the2006 international conference on Wireless communicationsand mobile computing, ACM: New York, NY, USA, 2006;183–188, doi:http://doi.acm.org/10.1145/1143549.1143587.

17. Mishra A, Shin MH, Petroni J NL, Clancy T, ArbaughW. Proactive key distribution using neighbor graphs.Wireless Communications, IEEE [see also IEEEPersonal Communications] Feb 2004; 11(1):26–36, doi:10.1109/MWC.2004.1269714.

18. Kassab M, Belghith A, Bonnin JM, Sassi S. Fast pre-authentication based on proactive key distribution for 802.11infrastructure networks. WMuNeP ’05: Proceedings of the1st ACM workshop on Wireless multimedia networking andperformance modeling, ACM: New York, NY, USA, 2005; 46–53, doi:http://doi.acm.org/10.1145/1089737.1089746.

19. Bohak A, Buttyan L, Dora L. An User AuthenticationScheme for Fast Handover Between WiFi Access Points.In Proceedings of the Third Annual International WirelessInternet Conference, ACM: Austin, Texas, USA, 2007.

20. IEEE Std 80211iTM. Medium Access Control (MAC) securityenhancements, amendment 6 to IEEE Standard for local andmetropolitan area networks part 11: Wireless Medium AccessControl (MAC) and Physical Layer (PHY) specifications. July2004.

21. IEEE 80211rTM-2008. IEEE Standard for InformationTechnology – Telecommunications and information exchangebetween systems - Local and metropolitan area networks -Specific requirements. Part 11: Wireless LAN Medium AccessControl (MAC) and Physical Layer (PHY) specifications.Amendment 2: Fast BSS Transition July 2008.

22. Pack S, Choi Y. Pre-Authenticated Fast Handoff in a PublicWireless LAN Based on IEEE 802.1x Model. PWC ’02:

Copyright c© 2008 John Wiley & Sons, Ltd.Prepared using wcmauth.cls

Wirel. Commun. Mob. Comput. 00: 1–25 (2008)DOI: 10.1002/wcm

Page 24: Securing Multi-operator Based QoS-aware Mesh …09wcmc.pdfWIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 00: 1–25 (2008) Published online in Wiley InterScience

24 I. ASKOXYLAKIS, B. BENCSATH, L. BUTTYAN, L. DORA, V. SIRIS, D. SZILI, I. VAJDA

Proceedings of the IFIP TC6/WG6.8 Working Conference onPersonal Wireless Communications, Kluwer, B.V.: Deventer,The Netherlands, The Netherlands, 2002; 175–182.

23. Pack S, Choi Y. Fast handoff scheme based on mobilityprediction in public wireless LAN systems. IEE ProceedingsCommunications, vol. 151, IEEE, 2004; 489–495.

24. Brik V, Mishra A, Banerjee S. Eliminating handoff latenciesin 802.11 WLANs using multiple radios: applications, expe-rience, and evaluation. IMC’05: Proceedings of the InternetMeasurement Conference 2005 on Internet MeasurementConference, USENIX Association: Berkeley, CA, USA, 2005;27–27.

25. Aboudagga N, Eltoweissy M, Quisquater JJ. Fast RoamingAuthentication in Wireless LANs. 2nd International Com-puter Engineering Conference: Engineering the InformationSociety, Cairo, Egypt, 2006.

26. Maccari L, Fantacci R, Pecorella T, Frosali F. A secureand performant token-based authentication for infrastructureand mesh 802.1x networks. In Proceedings of the IEEEInternational Conference on Communications 2006, IEEE,2006.

27. Maccari L, Fantacci R, Pecorella T, Frosali F. Secure, fasthandhoff techniques for 802.1X based wireless network.In Proceedings of the IEEE International Conference onCommunications 2006, IEEE, 2006.

28. Forsberg D, Ohba Y, Patil B, Tschofenig H, Yegin A.Protocol for Carrying Authentication for Network Access(PANA). RFC 5191 (Proposed Standard) May 2008. URLhttp://www.ietf.org/rfc/rfc5191.txt.

29. Calhoun P, Montemurro M, Stanley D. CAPWAP ProtocolSpecification October 2008. (work in progress).

30. IEEE Std 8021X-2001. IEEE Standard for Local andMetropolitan Area Networks - Port-Based Network AccessControl June 2001.

31. Aboba B, Blunk L, Vollbrecht J, Carlson J, LevkowetzH. Extensible Authentication Protocol (EAP).RFC 3748 (Proposed Standard) Jun 2004. URLhttp://www.ietf.org/rfc/rfc3748.txt, updatedby RFC 5247.

32. IEEE Std 80211fTM. IEEE Trial-Use Recommended Practicefor Multi-Vendor Access Point Interoperability via anInter-Access Point Protocol Across Distribution SystemsSupporting IEEE 802.11 Operation July 2003. (withdrawal in2006).

33. Dierks T, Allen C. The tls protocol 1999. RFC 2246.34. Ylonen T, C Lonvick E. The secure shell (ssh) protocol

architecture 2006. RFC 4251.35. Kent S, Seo K. Security architecture for the internet protocol

2005. RFC 4301.36. Krawczyk BM H, Canetti R. Hmac: Keyed-hashing for

message authentication 1997. RFC 2104.37. FIPS 197. Advanced Encryption Standard. Federal Informa-

tion Processing Standards Publication 197, US Departmentof Commerce, Bureau of Standards, National TechnicalInformation Service (NIST) 2001.

38. IEEE 80211sTM/D20. IEEE Standard for Information Tech-nology – Telecommunications and information exchangebetween systems - Local and metropolitan area networks -Specific requirements. Part 11: Wireless LAN Medium AccessControl (MAC) and Physical Layer (PHY) specifications.Draft amendment to standard IEEE 802.11TM: ESS MeshNetworking March 2008. (work in progress).

39. IEEE Std 80211TM-2007. Revision of IEEE Std 802.11-1999:Wireless LAN Medium Access Control (MAC) and PhysicalLayer (PHY) Specifications June 2007.

40. Perkins C, Belding-Royer E, Das S. Ad hocOn-Demand Distance Vector (AODV) Routing.RFC 3561 (Experimental) Jul 2003. URLhttp://www.ietf.org/rfc/rfc3561.txt.

41. Clausen T, Jacquet P. Optimized Link State RoutingProtocol (OLSR). RFC 3626 (Experimental) Oct 2003. URLhttp://www.ietf.org/rfc/rfc3626.txt.

42. Royer EM, Toh C. A review of current routing protocolsfor ad hoc mobile wireless networks. IEEE PersonalCommunications April 1999; 6(2):46–55.

43. Bahr M, Wang J, Jia X. Routing in wireless mesh networks.Wireless Mesh Networking: Architectures, Protocols andStandards, Zhang Y, Luo J, Hu H (eds.), Auerbach, 2006.

44. Hu YC, Perrig A. A survey of secure wireless ad hocrouting. IEEE Security and Privacy Magazine May/June 2004;2(3):28–39.

45. Buttyan L, Hubaux JP. Security and Cooperation in WirelessNetworks. Cambridge University Press, 2008.

46. Hu Y, Perrig A, Johnson D. Packet leashes: a defenseagainst wormhole attacks in wireless networks. Proceedingsof the IEEE Conference on Computer Communications(INFOCOM), San Francisco, CA, USA, 2003.

47. Hu YC, Perrig A, Johnson D. Rushing attacks and defense inwireless ad hoc network routing protocols. Proceedings of theACM Workshop on Wireless Security (WiSe), San Diego, CA,USA, 2003.

48. Hu Y, Perrig A, Johnson D. Efficient security mechanisms forrouting protocols. Proceedings of the Network and DistributedSystem Security Symposium (NDSS), San Diego, California,USA, 2003.

49. Zapata MG, Asokan N. Securing ad hoc routing protocols.Proceedings of the ACM Workshop on Wireless Security(WiSe), Atlanta, GA, USA, 2002.

50. Sanzgiri K, Dahill B, Levine B, Shields C, Belding-Royer E.A secure routing protocol for ad hoc networks. Proceedings ofthe International Conference on Network Protocols (ICNP),Paris, France, 2002.

51. Acs G, Buttyan L, Vajda I. Provable security of on-demand distance vector routing in wireless ad hoc networks.Proceedings of the European Workshop on Security andPrivacy in Ad Hoc and Sensor Networks (ESAS), Visegrad,Hungary, 2005.

52. Raffo D, Adjih C, Clausen T, Muhlethaler P. An advancedsignature system for OLSR. Proceedings of the ACMWorkshop on Security of Ad hoc and Sensor Networks (SASN),2004.

53. Boyd C, Mathuria A. Protocols for Authentication and KeyEstablishment. Springer, 2003.

54. Mishra A, Nadkarni K, Patcha A. Intrusion Detection inWireless Ad Hoc Networks. IEEE Wireless CommunicationsFebruary 2004; :48–60.

55. Wood A, Stankovic J. Denial of Service in Sensor Networks.IEEE Computer 2002; 35:53–57.

56. Xu W, Trappe W, Zhang Y, Wood T. The Feasibilityof Launching and Detecting Jamming Attacks in WirelessNetworks. Proc. of ACM MobiHoc, 2005.

57. Thuente D, Acharya M. Intelligent Jamming in WirelessNetworks with Applications to 802.11b and Other Networks.Proc. of IEEE MILCOM, 2006.

58. Gupta V, Krishnamurthy S, Faloutsos M. Denial of serviceattacks at the MAC layer in wireless ad hoc networks. Proc.of IEEE MILCOM, 2002.

59. Bayraktaroglu E, King C, Liu X, Noubir G, Rajaraman R,Thapa B. On the Performance of IEEE 802.11 under Jamming.Proc. of IEEE INFOCOM, 2008.

60. Zhang Y, Lee W. Intrusion Detection in Wireless Ad-HocNetworks. Proc. of ACM MobiCom, 2000.

61. Zhang Y, Lee W, Huang YA. Intrusion Detection Techniquesfor Mobile Wireless Networks. Wireless Networks September2003; 9(5):545–556.

62. Huang YA, Fan W, Lee W, Yu P. Cross-feature analysisfor detecting ad-hoc routing anomalies. Proc. of 23rd IntlConference on Distributed Computing Systems, 2003.

Copyright c© 2008 John Wiley & Sons, Ltd.Prepared using wcmauth.cls

Wirel. Commun. Mob. Comput. 00: 1–25 (2008)DOI: 10.1002/wcm

Page 25: Securing Multi-operator Based QoS-aware Mesh …09wcmc.pdfWIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 00: 1–25 (2008) Published online in Wiley InterScience

SECURING MULTI-OPERATOR BASED QOS-AWARE MESH NETWORKS 25

63. Liu H, Gupta R. Temporal Analysis of Routing Activity forAnomaly Detection in Ad hoc Networks. IEEE InternationalConference on Mobile Ad-hoc and Sensor Systems (MASS),2006.

64. Radosavac S, Moustakides G, Baras J, Koutsopoulos I. Ananalytic framework for modeling and detecting access layermisbehavior in wireless networks. ACM Transactions onInformation and System Security November 2008; 11(4).

65. Raya M, Aad I, Hubaux JP, Fawal AE. DOMINO: DetectingMAC layer greedy behavior in IEEE 802.11 hotspots. IEEETransactions on Mobile Computing 2006; 5(12).

66. ans S Mishra GT, Sridhar R. A Cross-layer Approach to DetectJamming Attacks in Wireless Ad Hoc Networks. Proc. ofIEEE MILCOM, 2006.

67. Xu W, Wood T, Trappe W, Zhang Y. Channel Surfing andSpatial Retreats: Defenses against Wireless Denial of Service.Proc. of ACM Workshop on Wireless Security (WiSe), 2004.

68. Xu W, Ma K, Trappe W, Zhang Y. Jamming Sensor Networks:Attack and Defense Strategies. IEEE Network May/June 2006;:41–47.

69. Navda V, Bohra A, Ganguly S, Rubenstein D. Using ChannelHopping to Increase 802.11 Resilience to Jamming Attacks.Proc. of IEEE INFOCOM, 2007.

70. Liu X, Noubir G, Sundaram R, Tan S. SPREAD: Foiling SmartJammers using Multi-layer Agility. Proc. of IEEE INFOCOM,2007.

Copyright c© 2008 John Wiley & Sons, Ltd.Prepared using wcmauth.cls

Wirel. Commun. Mob. Comput. 00: 1–25 (2008)DOI: 10.1002/wcm