Title :
Intrusion Tolerant Routing for Mesh Networks
Author :
Krichene, Neila ; Boudriga, Noureddine
Author_Institution :
Carthage Univ., Tunis
Abstract :
We propose in this paper a protocol called MERQIT which secure the routing service for the wireless mesh networks while guaranteeing the end-to-end QoS requirements in terms of delay, our approach provides an intrusion tolerant environment and uses and enhances the concept of trusted timely computing base (Ferreira and Verrissimo, 2002) to deduce consistent delay information while tolerating DoS and wormhole attacks. MERQIT also detects and isolates malicious managers while rescuing the affected flows.
Keywords :
quality of service; radio networks; telecommunication network routing; MERQIT; end-to-end QoS requirements; intrusion tolerant routing; routing service; tolerating DoS; trusted timely computing base; wireless mesh networks; Authentication; Communication system security; Delay; Disruption tolerant networking; Kernel; Mesh networks; Routing protocols; Telecommunication traffic; Wireless application protocol; Wireless mesh networks;
Conference_Titel :
Wireless and Optical Communications Networks, 2007. WOCN '07. IFIP International Conference on
Conference_Location :
Singapore
Print_ISBN :
1-4244-1005-3
Electronic_ISBN :
1-4244-1005-3
DOI :
10.1109/WOCN.2007.4284178