Mobility Mechanism included Mobile Routing Method in a

4
 Mobility Mechanism included Mobile Routing Method in a Wireless Mesh Network Environment Seung-heub Jeon 1 , Young-bok Cho 1 , Sang-ho Lee 2 School of Computer Science Chungbuk National University, Seoul, South Korea School of Electrical &Computer Engineering Chungbuk National University, Seoul, South Korea 1  [email protected] , 2 [email protected] , 3 [email protected] Abstract Wireless Mesh Networks dynamically forms a network and each node connects and maintains a mesh network. The Mesh network is a hybrid WMNs, combined by two network mobilities which is the MANETs based Backbone WMNs and the non-MANET based Client WMNs. This research recommends a routing method that provides interoperability and effectiveness in the BWMNs and CWMNs combined HWMNs network. This method used the same routing protocol as the BWMNs and CWMNs network to solve the MDM problem of the node that occurs in the mobility of a wireless environment. Also by using proxy ARP to solve the vibration conditions that occur when connecting to BWMNs and CWMNs network, the node mobility supporting problem in the heterogeneous network was solved. It solved the two major problems in the previous Wireless Mesh Networks. By using the limited routing method, the mobility was supported by effectively intensifying the heterogeneous Wireless Mesh Networks. At the same time, as the surrounding Node number increased, the movements of the packet transmission rate from the gateway stabilized compared with the previous OLSR method. 1. Introduction A Mash Router to connect an Ad-hoc network, the internet and other basic network is needed to implement the Wireless Mesh Network. Also, basically two wireless interfaces are needed to compose the Wireless Mesh Networks. One will be used as the interface to connect with the Wireless Backbone Networks and the other is for the communication with the user. The search and selection of a Mash Router is a crucial issue in a Wireless Mesh Networks environment where the Ad-hoc network connects with the internet and this effects the network performance. The strong points of a Wireless Mesh Networks is the flexibility and scalability of networks such as easy expansion of network without the connecting to the wired internet, the speed and price of installation and the redundancy through diverse routes. Moreover the Wireless Mesh Networks is in the center of attention due to the fact that it is an effective technology when composing an independent network using wireless channels or forming a relay network for internet access. However, currently the research on Wireless Mesh Networks security is not enough. Therefore, new technology on security is needed. The security can be easily penetrated since it is a broadband network, the channel and node is weak and the network topology is dynamic. Usually the network security is penetrated by providing the wrong routing update information in the routing protocol. To design a key management server that secures the stability of a Mesh Network, this research provides methods that controls the broadcast message inside the network stack of an internal node that exists on the network of a Mesh Network node. The contents of this research is as follows. On Section 2, related research on the composition and the connection of Hybrid Wireless Mesh Networks is described with the analysis on the authentication plan and it's protocol for the Wireless Mesh Networks. On Section 3, shows the designed Wireless Mesh Networks and embodied mobility of a gateway. On Section 4, presents the performance analysis of the recommended system as well as it's results. On Section 5, the conclusion and future research plans are indicated. 2. Related work 2.1 The Structure and the Routing technology of the Hybrid Wireless Mesh Networks(HWMNs) The typical form of a Mesh Client Network is the MANETs. To transmit the packet of network layers in MANETs, an OLSR(OLSR, Optimized Link State Routing) protocol moves in the Ad-hoc link and the internet layer routing protocol moves in the Wire-Link. Figure 1. Hybrid Wireless Mesh Netowk r [Figure 1] shows the connected HWMNs structure via one MCG(MCG,Mash Cluster Gateway) that acts as the gateway of the left CWMNs(Clinet Wireless Mesh Networks) and the right BWMNs. Here it is connect by the Ad-hoc MANETS gateway network. The most suitable route in transmitting of packet in a network layer is the Proactive Routing method and the Reactive Routing Method. Their typical protocols are relatively the OLSR and the DMNO(DMNO,Dynamic Mesh Network On-demand). If they are used with different routing protocols, an overload problem will occur in which 2 Corresponding Author 9781-4244-3428-2/09/$ 25.00 ©2009 IEEE

Transcript of Mobility Mechanism included Mobile Routing Method in a

Page 1: Mobility Mechanism included Mobile Routing Method in a

8/7/2019 Mobility Mechanism included Mobile Routing Method in a

http://slidepdf.com/reader/full/mobility-mechanism-included-mobile-routing-method-in-a 1/4 

Mobility Mechanism included Mobile Routing Method in a

Wireless Mesh Network Environment

Seung-heub Jeon1, Young-bok Cho

1, Sang-ho Lee

2

School of Computer Science

Chungbuk National University, Seoul, SouthKorea

School of Electrical &Computer Engineering

Chungbuk National University, Seoul, SouthKorea

[email protected] ,[email protected] ,

[email protected] 

Abstract

Wireless Mesh Networks dynamically forms a network and

each node connects and maintains a mesh network. The Meshnetwork is a hybrid WMNs, combined by two network mobilities which is the MANETs based Backbone WMNs and

the non-MANET based Client WMNs. This researchrecommends a routing method that provides interoperability

and effectiveness in the BWMNs and CWMNs combinedHWMNs network. This method used the same routingprotocol as the BWMNs and CWMNs network to solve theMDM problem of the node that occurs in the mobility of a

wireless environment. Also by using proxy ARP to solve the

vibration conditions that occur when connecting to BWMNsand CWMNs network, the node mobility supporting problemin the heterogeneous network was solved. It solved the twomajor problems in the previous Wireless Mesh Networks. By

using the limited routing method, the mobility was supported

by effectively intensifying the heterogeneous Wireless MeshNetworks. At the same time, as the surrounding Node number 

increased, the movements of the packet transmission rate fromthe gateway stabilized compared with the previous OLSR method.

1.  Introduction

A Mash Router to connect an Ad-hoc network, the internet and

other basic network is needed to implement the Wireless MeshNetwork. Also, basically two wireless interfaces are needed tocompose the Wireless Mesh Networks. One will be used as the

interface to connect with the Wireless Backbone Networks andthe other is for the communication with the user. The search

and selection of a Mash Router is a crucial issue in a WirelessMesh Networks environment where the Ad-hoc network connects with the internet and this effects the network 

performance.The strong points of a Wireless Mesh Networks is the

flexibility and scalability of networks such as easy expansionof network without the connecting to the wired internet, thespeed and price of installation and the redundancy throughdiverse routes. Moreover the Wireless Mesh Networks is in

the center of attention due to the fact that it is an effectivetechnology when composing an independent network using

wireless channels or forming a relay network for internetaccess. However, currently the research on Wireless MeshNetworks security is not enough. Therefore, new technologyon security is needed. The security can be easily penetrated

since it is a broadband network, the channel and node is weak 

and the network topology is dynamic. Usually the network 

security is penetrated by providing the wrong routing update

information in the routing protocol. To design a keymanagement server that secures the stability of a Mesh

Network, this research provides methods that controls the

broadcast message inside the network stack of an internal nodethat exists on the network of a Mesh Network node. Thecontents of this research is as follows. On Section 2, related

research on the composition and the connection of HybridWireless Mesh Networks is described with the analysis on the

authentication plan and it's protocol for the Wireless MeshNetworks. On Section 3, shows the designed Wireless MeshNetworks and embodied mobility of a gateway. On Section 4,presents the performance analysis of the recommended systemas well as it's results. On Section 5, the conclusion and future

research plans are indicated.

2.  Related work 

2.1 The Structure and the Routing technology of the

Hybrid Wireless Mesh Networks(HWMNs)

The typical form of a Mesh Client Network is the MANETs.

To transmit the packet of network layers in MANETs, an

OLSR(OLSR, Optimized Link State Routing) protocol movesin the Ad-hoc link and the internet layer routing protocolmoves in the Wire-Link.

Figure 1. Hybrid Wireless Mesh Netowk r 

[Figure 1] shows the connected HWMNs structure via oneMCG(MCG,Mash Cluster Gateway) that acts as the gateway

of the left CWMNs(Clinet Wireless Mesh Networks) and the

right BWMNs. Here it is connect by the Ad-hoc MANETSgateway network. The most suitable route in transmitting of packet in a network layer is the Proactive Routing method andthe Reactive Routing Method. Their typical protocols arerelatively the OLSR and the DMNO(DMNO,Dynamic Mesh

Network On-demand). If they are used with different routing

protocols, an overload problem will occur in which

2Corresponding Author 

9781-4244-3428-2/09/$25.00 ©2009 IEEE

Page 2: Mobility Mechanism included Mobile Routing Method in a

8/7/2019 Mobility Mechanism included Mobile Routing Method in a

http://slidepdf.com/reader/full/mobility-mechanism-included-mobile-routing-method-in-a 2/4 

simultaneous protcol conversion must be taken in the gateway.

Therefore to perform an effective connection, the same L3routing protocol must be used in both CWMNs and BWENs.

2.2 Wireless Mesh Networks Authentication Plans

To authenticate the Wireless Mesh Networks, methods such as

using a reliable node, using a cluster and using a router was

introduced. Among them the third method which was to use areliable node is not suitable due to the fact that the nodes usedeverytime should always be reliable. The method to use cluster 

classifies the Wireless Mesh Networks into cluster units and

issues authentication to each cluster header. However there isa defect that if one of the cluster header is attacked or does notplay it's role, all the nodes under it will be affected. Therouting method, routes all the nodes in the Wireless MeshNetworks as well as issues authentication. This method has the

weakness in additionally transmitting the authentication. Also

this method didn't consider the home network environmentwhere a host and a guest exists so the Wireless MeshNetworks in slow and hard to manage.

3. 

Mobile Routing in a Wireless Mesh Network Environment

MS(MS,Mobile Station), a composition of MANETs, can

easily identify the wireless environment that it is located atbecause of the loaded MDM(MDM,Mode Detection

Mechanism) module. At the end, this network structure has tosupport the IP Mobility when the Mobile Node is connected tothe MANETs or when the MANETs Mobile Node is moved to

a normal access network. [Figure 2] shows the structure of aDMNO based Wireless Mesh Networks.

Figure 2. Wireless mash network structure based MYMO

As shown, the DMNO based Wireless Mesh Networksstructure does not demand additional function to the Mobile

Node for it's previous wireless environment or compatibility

and supports the mobility of the Node to it's final destinationonly when a request to transmit a packet(a key characteristicsof a DMNO routing protocol) is placed.

3.1 Wireless Mesh Cluster Gateway and Mobile Node

Each Wireless MCG moves as the administrator according tothe IEEE802.11b standard of the WLAN domain and provideswireless access service to managed mode Mobile Node. Alsoit operates on the DHCP(DHCP,dinamic Host configurationProtocol) server to automatically provide IP addresses to

primary mobile Nodes. Then to access between networks withother Wireless MCG formed by the wireless distributionsystem, each WDS interface is allocated with an independentIP address. An IP Mobility design in a DMNO protocol based

limited network is simple but supports perfectly by using the

Multi-Hop ARP method which uses the proxy ARP, RREQ of DMNO and RREP.

Figure 3 Multi-hop ARP Request and Reply step

[Figure 3] shows the Multi-Hop ARP reply by stage and the

transmitting procedure of the replied message after a Multi-Hop ARP message request in a DMNO protocol based

Wireless Mesh Networks. [Node 4] shows the procedure of acommunicating MS-1 moving to another MCG-4 domain andconnecting to L2 and finishing the ARP procedure for theprimary gateway IP address of the Mobile Node and

continuing to search the route and it's connecting Multi-Hop

ARP for the data packet that MS-1 is transmitting.

Figure 4. Multi-hop ARP Request step of support the Mobility

The proxy ARP and the Multi-Hop ARP method to support theIP Mobility didn't change the reply of a DMNO routingprotocol of a DMNO based Wireless Mesh Networks to form aroute for the package to it's final destination only on request.

3.2 Block of Malicious Node

The proposed method to secure the wireless network isconnection, encryption and a message to block maliciousnode. The connecting method is by the nodes under HWMNs

using a wireless relay method to communicate and each nodeforms a Symmetric Link to guard the data transmission of it's

neighboring node. The encryption method is by using an

Page 3: Mobility Mechanism included Mobile Routing Method in a

8/7/2019 Mobility Mechanism included Mobile Routing Method in a

http://slidepdf.com/reader/full/mobility-mechanism-included-mobile-routing-method-in-a 3/4 

asymmetric encrypting method to prevent optional reports

from other nodes. To issue an authentication, the personal keyis only known to the node himself and the public key isregistered at an authentication institution which is connected

to the HWMNs backbone and so only the nodes who share theMesh Network will know the public key. Only the nodes who

have the official authentication can report a malicious node at

the message producing stage and when reporting a node with aforged authentication, you can also identify the reporter through the authentication institute. To block a malicious node

in a WMNs environment, the message used are reporting,

disputing and proving. The messages supporting the report of a malicious node are the reporting node, the target node and amalicious node. Next, when a node who received a disputingmessage in an encrypted report and wants to send it to other nodes, he must first check if any of his target node is on and if 

his name is on the list of the targeted nodes, he must broadcast

a dispute message to prove that he isn't a malicious node.Finally, a proving message is to prove the innocence of areported message and when the node who sent a reportmessage receives a disputing message, he can attach and send

a received message or data to identify the forgery or prove thereported or disputed message.

4.  Experimental Results

A proxy ARP was proposed to effectively transmit a wirelessmesh cluster gateway by reducing the overload of DMNO

protocol based network and by connecting the Multi-HopARP, mobility was embodied. In a Wireless Mesh Network with the basis of a distribution system based DMNO protocol,

not only the Mobility Node but also the Wireless Mesh Cluster was able to move. Therefore, the Wireless Mesh Cluster managed the WDS link between the Wireless Mesh Cluster 

gateway and drove the daemon of allocating IP addresses toWDS interface. Also to effectively manage the IP sub-

network, the Wireless Mesh Cluster gateway ran the DHCPserver and as the routing protocol to form other Wireless MeshCluster gateway and MANETs, it drove the DMNO-DCNdaemon using the callback function of a Netfilter-Hook 

method. The Wireless Mesh Cluster gateway also supports the

Multi-hop ARP to support the mobility of the Mobile Nodes.If the RREQ message found by using the DMNO-DCNdaemon is received through the DMNO socket in the middleof the Wireless Mesh Cluster gateway, the DMNO daemon

stores the routing entry of the pocket's origin IP address in therouting table and rebroadcasts the RREP message. Also when

the destination Node receives the RREQ message via DMNOsocket, DMNO daemon stores the routing entry of the pocket'sorigin IP address in the routing table and rebroadcasts the

RREP message.

4.2 Performance & Mobility According to the Increase of 

Hop & Node Numbers

Two Wireless Mesh Networks were placed each at the2500*2500(m) range from the gateway and 60 Mobile Nodethat composes each network were optionally allocated. Then

the packet loss of OLSR and the DMNO were analyze byincreasing one hop of two communicating Mobile Node fromthe gateway. Also to experiment the mobility, the WirelessMesh Cluster gateway were given the same Extended ServiceSet ID and channels to manage an independent IP sub-network.

To identify the practical transmission of the data packet, thepacket analyzer was turned on for two Mobile Node and four 

Wireless Mesh Cluster gateway. As shown in the graph of [Figure 5], OLSR shows increase of packet loss between thetwo Mobile Node according to the increase of hop numbers

from the gateway. This goes in line with the fact that as the

hop numbers increases the relocating time for the network routing table increases as well. On the other hand, you can seethat there is no packet loss for DMNO since it only sets the

route for the requested destination without having to relocatedthe network route.

Figure 5. Pack delivery rate of increase around number of node

On the graph of [Figure 6], you can see that for OLSR, thepacket loss rapidly increases along with the increased number of Mobile Node. This goes in line with the fact that as the

number of communicating Mobile Node increases thecontrolling data to find the network's destination route alsorapidly increases.

Figure 6. Hop count increment to gateway

Figure 7. Routing table of two node befor moving 

Page 4: Mobility Mechanism included Mobile Routing Method in a

8/7/2019 Mobility Mechanism included Mobile Routing Method in a

http://slidepdf.com/reader/full/mobility-mechanism-included-mobile-routing-method-in-a 4/4 

The routing table of the two communicating Mobile Node is as

[Figure 7]. The basic gateway of the two Mobile Node isidentical to the Wireless Mesh Cluster gateway that controlstheir relative IP addresses.

Before moving, Ping was performed from MS-2 to MS-5 andthe captured packed from the two Mobile Node were

transmitted by the most suitable route in the middle of the

Mesh gateway as the data packet and provided transparency tothe two Mobile Node. If the communicating Mobile Node MS-5 moves to the IP network of the middle Wireless Mesh

Cluster gateway MCG-4, it will be connected with the

physically linked wireless mesh cluster gateway and the basicgateway IP address of the routing table will be the previous IPaddress of the Wireless Mesh Cluster gateway. Therefore theproxy ARP of the moved Wireless Cluster gateway MCG-4will activate normally. The routing table of the middle

wireless mesh cluster gateway will move from MS-2 to MCG-

4 and after the procedure of proxy ARP, the data packet willcontinuously be transmitted to MCG-4 and then the MCG-4will form new routes using the Multi-Hop ARP method whichis connected with the routing search of DMNO daemon.

5.  Conclusions

The structure of the wireless network for the next generationwill be a mixed heterogeneous wireless network of different

characteristics and services. As the scale of the wirelessnetwork expands, the former OLSR protocol method of 

transmitting packets will rapidly increase the confusion of thenetwork and eventually the efficiency of the network willdrop. Therefore the proposed DMNO based wireless Mesh

networks of this research will be an alternative to solve thisproblem. The wireless mesh clusters will form a DMNOprotocol based wireless Mesh Networks and to provide

wireless access service to the former mobile nodes withoutdemanding any additional function, the wireless mesh cluster 

gateway will be based on an wireless infrastructureenvironment. Also the managed mode mobile node should beprovided with continuous IP mobility as they move freelyacross the Wireless mesh cluster gateway. This research

introduced an expanded multi-hop ARP method to provide

effective IP Mobility to mobile nodes by using proxy ARP andDMNO protocol routing search procedures. Also the mobilitymovement was embodied on the basis of linux system. As aresult, this research showed how this Heterogeneous wireless

mesh network can maximize the effectiveness of the network 

and provided a guideline when designing a Wireless MeshNetwork.

6.  References[1]  He, Z.L, Tsui, C.Y., Chan, K.K., and Liou, M.L.,

“Low-power VLSI design for motion estimation usingadaptive pixel truncation”, IEEE Trans. Circuit Syst.

Video Technol. 10(5):669-678, 2000.

[1] Song, Z., Roussopoulos, N. "K-Nearest Neighbor Searchfor Moving Query Point".SSTD, 2001.

[2] Zheng B., Lee, D. "Semantic Cachng in Locatikdar, B.; "Aprotocol for tracking mobile targets using sensor 

networks". Proceedings of the First IEEE. 2003

Page(s):71 – 81

[3] Xu, Y.; Winter, J.; Lee, W.-C.; "Dual prediction-based

reporting for object tracking sensor networks".Proceedings of MOBIQUITOUS 2004. Page(s):154 – 163

[4] Paolo Santi,“Topology Control in Wireless Ad Hoc and

Sensor Networks,”WILEY

[5] Seema Bandyopadhyay, E.J. Coyle,"An Energy Efficient

Hierarchical Clustering Algorithm for Wireless Sensor 

Networks" Infocom 2003, IEEE Vol 3, 30 Mar-3 April2003 Page(s):1713-1723

[6] Cho Young-bok, Lee Sang-ho, An Energy EfficientClustering Scheme of Mobile Sink Node in Wireless

Sensor Networks, Preceedings of the 7th WSEAS

International Conference on CIRCUITS, SYSTEMS,ELECTRONICS, CONTROL and SIGNALPROCESSING(CSECS 08)Puerto De La Cruz, Tenerife,Canary Islands, Spain, ISBN: 978-960-474-035-2,

December 15-17, 2008, pp. 317-320[7] Young-Bok Cho, Sung-Hee Woo, Sang-Ho Lee, Efficient

Key Distribution Scheme for Secure Routing in WirelesMesh Network Environment, Proceeding of the 7thWSEAS International Conference on INFORMATION

SECURITY and PRIVACY (ISP '08) Cairo, Egypt,ISBN: 978-960-474-048-2, Dec, 29-31, 2008, pp. 79-82

[8] YOUNB-BOK CHO, YOON-SU JEONG, SANG-HOLEE, Dynamic Prediction Clustering Scheme for MobileSensor Node of Sensor Network Environment, THE 11th

INTERNATIONAL CONFERENCE on ADVANCEDCOMMUNICATION TECHNOLOGY, Phoenix Park,Koren, ISBN: 978-89-5519-139-4, Feb, 15-18, 2009, pp.

266-270