Sie sind auf Seite 1von 4

Mobility Mechanism included Mobile Routing Method in a

Wireless Mesh Network Environment


Seung-heub Jeon1, Young-bok Cho1, Sang-ho Lee2
1 2
School of Computer Science School of Electrical &Computer Engineering
Chungbuk National University, Seoul, South Chungbuk National University, Seoul, South
Korea Korea
1
star4635@empas.com , 2bogicho@chungbuk.ac.kr , 3
shlee@chungbuk.ac.kr

information in the routing protocol. To design a key


Abstract management server that secures the stability of a Mesh
Wireless Mesh Networks dynamically forms a network and Network, this research provides methods that controls the
each node connects and maintains a mesh network. The Mesh broadcast message inside the network stack of an internal node
network is a hybrid WMNs, combined by two network that exists on the network of a Mesh Network node. The
mobilities which is the MANETs based Backbone WMNs and contents of this research is as follows. On Section 2, related
the non-MANET based Client WMNs. This research research on the composition and the connection of Hybrid
recommends a routing method that provides interoperability Wireless Mesh Networks is described with the analysis on the
and effectiveness in the BWMNs and CWMNs combined authentication plan and it's protocol for the Wireless Mesh
HWMNs network. This method used the same routing Networks. On Section 3, shows the designed Wireless Mesh
protocol as the BWMNs and CWMNs network to solve the Networks and embodied mobility of a gateway. On Section 4,
MDM problem of the node that occurs in the mobility of a presents the performance analysis of the recommended system
wireless environment. Also by using proxy ARP to solve the as well as it's results. On Section 5, the conclusion and future
vibration conditions that occur when connecting to BWMNs research plans are indicated.
and CWMNs network, the node mobility supporting problem
in the heterogeneous network was solved. It solved the two 2. Related work
major problems in the previous Wireless Mesh Networks. By
2.1 The Structure and the Routing technology of the
using the limited routing method, the mobility was supported
Hybrid Wireless Mesh Networks(HWMNs)
by effectively intensifying the heterogeneous Wireless Mesh
The typical form of a Mesh Client Network is the MANETs.
Networks. At the same time, as the surrounding Node number
To transmit the packet of network layers in MANETs, an
increased, the movements of the packet transmission rate from
OLSR(OLSR, Optimized Link State Routing) protocol moves
the gateway stabilized compared with the previous OLSR
in the Ad-hoc link and the internet layer routing protocol
method.
moves in the Wire-Link.
1. Introduction
A Mash Router to connect an Ad-hoc network, the internet and
other basic network is needed to implement the Wireless Mesh
Network. Also, basically two wireless interfaces are needed to
compose the Wireless Mesh Networks. One will be used as the
interface to connect with the Wireless Backbone Networks and
the other is for the communication with the user. The search
and selection of a Mash Router is a crucial issue in a Wireless
Mesh Networks environment where the Ad-hoc network
connects with the internet and this effects the network
performance.
The strong points of a Wireless Mesh Networks is the
flexibility and scalability of networks such as easy expansion
of network without the connecting to the wired internet, the Figure 1. Hybrid Wireless Mesh Netowkr
speed and price of installation and the redundancy through
diverse routes. Moreover the Wireless Mesh Networks is in [Figure 1] shows the connected HWMNs structure via one
the center of attention due to the fact that it is an effective MCG(MCG,Mash Cluster Gateway) that acts as the gateway
technology when composing an independent network using of the left CWMNs(Clinet Wireless Mesh Networks) and the
wireless channels or forming a relay network for internet right BWMNs. Here it is connect by the Ad-hoc MANETS
access. However, currently the research on Wireless Mesh gateway network. The most suitable route in transmitting of
Networks security is not enough. Therefore, new technology packet in a network layer is the Proactive Routing method and
on security is needed. The security can be easily penetrated the Reactive Routing Method. Their typical protocols are
since it is a broadband network, the channel and node is weak relatively the OLSR and the DMNO(DMNO,Dynamic Mesh
and the network topology is dynamic. Usually the network Network On-demand). If they are used with different routing
security is penetrated by providing the wrong routing update protocols, an overload problem will occur in which

2
Corresponding Author

9781-4244-3428-2/09/$25.00 ©2009 IEEE


simultaneous protcol conversion must be taken in the gateway. primary mobile Nodes. Then to access between networks with
Therefore to perform an effective connection, the same L3 other Wireless MCG formed by the wireless distribution
routing protocol must be used in both CWMNs and BWENs. system, each WDS interface is allocated with an independent
IP address. An IP Mobility design in a DMNO protocol based
2.2 Wireless Mesh Networks Authentication Plans limited network is simple but supports perfectly by using the
To authenticate the Wireless Mesh Networks, methods such as Multi-Hop ARP method which uses the proxy ARP, RREQ of
using a reliable node, using a cluster and using a router was DMNO and RREP.
introduced. Among them the third method which was to use a
reliable node is not suitable due to the fact that the nodes used
everytime should always be reliable. The method to use cluster
classifies the Wireless Mesh Networks into cluster units and
issues authentication to each cluster header. However there is
a defect that if one of the cluster header is attacked or does not
play it's role, all the nodes under it will be affected. The
routing method, routes all the nodes in the Wireless Mesh
Networks as well as issues authentication. This method has the
weakness in additionally transmitting the authentication. Also
this method didn't consider the home network environment
where a host and a guest exists so the Wireless Mesh
Networks in slow and hard to manage.

3. Mobile Routing in a Wireless Mesh Network Figure 3 Multi-hop ARP Request and Reply step
Environment
MS(MS,Mobile Station), a composition of MANETs, can [Figure 3] shows the Multi-Hop ARP reply by stage and the
easily identify the wireless environment that it is located at transmitting procedure of the replied message after a Multi-
because of the loaded MDM(MDM,Mode Detection Hop ARP message request in a DMNO protocol based
Mechanism) module. At the end, this network structure has to Wireless Mesh Networks. [Node 4] shows the procedure of a
support the IP Mobility when the Mobile Node is connected to communicating MS-1 moving to another MCG-4 domain and
the MANETs or when the MANETs Mobile Node is moved to connecting to L2 and finishing the ARP procedure for the
a normal access network. [Figure 2] shows the structure of a primary gateway IP address of the Mobile Node and
DMNO based Wireless Mesh Networks. continuing to search the route and it's connecting Multi-Hop
ARP for the data packet that MS-1 is transmitting.

Figure 2. Wireless mash network structure based MYMO


Figure 4. Multi-hop ARP Request step of support the Mobility
As shown, the DMNO based Wireless Mesh Networks
structure does not demand additional function to the Mobile
The proxy ARP and the Multi-Hop ARP method to support the
Node for it's previous wireless environment or compatibility IP Mobility didn't change the reply of a DMNO routing
and supports the mobility of the Node to it's final destination protocol of a DMNO based Wireless Mesh Networks to form a
only when a request to transmit a packet(a key characteristics route for the package to it's final destination only on request.
of a DMNO routing protocol) is placed.
3.2 Block of Malicious Node
3.1 Wireless Mesh Cluster Gateway and Mobile Node The proposed method to secure the wireless network is
Each Wireless MCG moves as the administrator according to connection, encryption and a message to block malicious
the IEEE802.11b standard of the WLAN domain and provides node. The connecting method is by the nodes under HWMNs
wireless access service to managed mode Mobile Node. Also using a wireless relay method to communicate and each node
it operates on the DHCP(DHCP,dinamic Host configuration forms a Symmetric Link to guard the data transmission of it's
Protocol) server to automatically provide IP addresses to
neighboring node. The encryption method is by using an
asymmetric encrypting method to prevent optional reports Wireless Mesh Cluster gateway. As shown in the graph of
from other nodes. To issue an authentication, the personal key [Figure 5], OLSR shows increase of packet loss between the
is only known to the node himself and the public key is two Mobile Node according to the increase of hop numbers
registered at an authentication institution which is connected from the gateway. This goes in line with the fact that as the
to the HWMNs backbone and so only the nodes who share the hop numbers increases the relocating time for the network
Mesh Network will know the public key. Only the nodes who routing table increases as well. On the other hand, you can see
have the official authentication can report a malicious node at that there is no packet loss for DMNO since it only sets the
the message producing stage and when reporting a node with a route for the requested destination without having to relocated
forged authentication, you can also identify the reporter the network route.
through the authentication institute. To block a malicious node
in a WMNs environment, the message used are reporting,
disputing and proving. The messages supporting the report of
a malicious node are the reporting node, the target node and a
malicious node. Next, when a node who received a disputing
message in an encrypted report and wants to send it to other
nodes, he must first check if any of his target node is on and if
his name is on the list of the targeted nodes, he must broadcast
a dispute message to prove that he isn't a malicious node.
Finally, a proving message is to prove the innocence of a
reported message and when the node who sent a report
message receives a disputing message, he can attach and send
a received message or data to identify the forgery or prove the
reported or disputed message. Figure 5. Pack delivery rate of increase around number of node

4. Experimental Results On the graph of [Figure 6], you can see that for OLSR, the
packet loss rapidly increases along with the increased number
A proxy ARP was proposed to effectively transmit a wireless of Mobile Node. This goes in line with the fact that as the
mesh cluster gateway by reducing the overload of DMNO number of communicating Mobile Node increases the
protocol based network and by connecting the Multi-Hop controlling data to find the network's destination route also
ARP, mobility was embodied. In a Wireless Mesh Network rapidly increases.
with the basis of a distribution system based DMNO protocol,
not only the Mobility Node but also the Wireless Mesh Cluster
was able to move. Therefore, the Wireless Mesh Cluster
managed the WDS link between the Wireless Mesh Cluster
gateway and drove the daemon of allocating IP addresses to
WDS interface. Also to effectively manage the IP sub-
network, the Wireless Mesh Cluster gateway ran the DHCP
server and as the routing protocol to form other Wireless Mesh
Cluster gateway and MANETs, it drove the DMNO-DCN
daemon using the callback function of a Netfilter-Hook
method. The Wireless Mesh Cluster gateway also supports the
Multi-hop ARP to support the mobility of the Mobile Nodes.
If the RREQ message found by using the DMNO-DCN
daemon is received through the DMNO socket in the middle
of the Wireless Mesh Cluster gateway, the DMNO daemon Figure 6. Hop count increment to gateway
stores the routing entry of the pocket's origin IP address in the
routing table and rebroadcasts the RREP message. Also when
the destination Node receives the RREQ message via DMNO
socket, DMNO daemon stores the routing entry of the pocket's
origin IP address in the routing table and rebroadcasts the
RREP message.

4.2 Performance & Mobility According to the Increase of


Hop & Node Numbers
Two Wireless Mesh Networks were placed each at the
2500*2500(m) range from the gateway and 60 Mobile Node
that composes each network were optionally allocated. Then
the packet loss of OLSR and the DMNO were analyze by Figure 7. Routing table of two node befor moving
increasing one hop of two communicating Mobile Node from
the gateway. Also to experiment the mobility, the Wireless
Mesh Cluster gateway were given the same Extended Service
Set ID and channels to manage an independent IP sub-network.
To identify the practical transmission of the data packet, the
packet analyzer was turned on for two Mobile Node and four
The routing table of the two communicating Mobile Node is as [3] Xu, Y.; Winter, J.; Lee, W.-C.; "Dual prediction-based
[Figure 7]. The basic gateway of the two Mobile Node is reporting for object tracking sensor networks".
identical to the Wireless Mesh Cluster gateway that controls Proceedings of MOBIQUITOUS 2004. Page(s):154 – 163
their relative IP addresses. [4] Paolo Santi, “Topology Control in Wireless Ad Hoc and
Before moving, Ping was performed from MS-2 to MS-5 and Sensor Networks,” WILEY
the captured packed from the two Mobile Node were [5] Seema Bandyopadhyay, E.J. Coyle,"An Energy Efficient
transmitted by the most suitable route in the middle of the Hierarchical Clustering Algorithm for Wireless Sensor
Mesh gateway as the data packet and provided transparency to Networks" Infocom 2003, IEEE Vol 3, 30 Mar-3 April
the two Mobile Node. If the communicating Mobile Node MS- 2003 Page(s):1713-1723
5 moves to the IP network of the middle Wireless Mesh [6] Cho Young-bok, Lee Sang-ho, An Energy Efficient
Cluster gateway MCG-4, it will be connected with the Clustering Scheme of Mobile Sink Node in Wireless
physically linked wireless mesh cluster gateway and the basic Sensor Networks, Preceedings of the 7th WSEAS
gateway IP address of the routing table will be the previous IP International Conference on CIRCUITS, SYSTEMS,
address of the Wireless Mesh Cluster gateway. Therefore the ELECTRONICS, CONTROL and SIGNAL
proxy ARP of the moved Wireless Cluster gateway MCG-4 PROCESSING(CSECS 08)Puerto De La Cruz, Tenerife,
will activate normally. The routing table of the middle Canary Islands, Spain, ISBN: 978-960-474-035-2,
wireless mesh cluster gateway will move from MS-2 to MCG- December 15-17, 2008, pp. 317-320
4 and after the procedure of proxy ARP, the data packet will [7] Young-Bok Cho, Sung-Hee Woo, Sang-Ho Lee, Efficient
continuously be transmitted to MCG-4 and then the MCG-4 Key Distribution Scheme for Secure Routing in Wireles
will form new routes using the Multi-Hop ARP method which Mesh Network Environment, Proceeding of the 7th
is connected with the routing search of DMNO daemon. WSEAS International Conference on INFORMATION
SECURITY and PRIVACY (ISP '08) Cairo, Egypt,
5. Conclusions ISBN: 978-960-474-048-2, Dec, 29-31, 2008, pp. 79-82
The structure of the wireless network for the next generation [8] YOUNB-BOK CHO, YOON-SU JEONG, SANG-HO
will be a mixed heterogeneous wireless network of different LEE, Dynamic Prediction Clustering Scheme for Mobile
characteristics and services. As the scale of the wireless Sensor Node of Sensor Network Environment, THE 11th
network expands, the former OLSR protocol method of INTERNATIONAL CONFERENCE on ADVANCED
transmitting packets will rapidly increase the confusion of the COMMUNICATION TECHNOLOGY, Phoenix Park,
network and eventually the efficiency of the network will Koren, ISBN: 978-89-5519-139-4, Feb, 15-18, 2009, pp.
drop. Therefore the proposed DMNO based wireless Mesh 266-270
networks of this research will be an alternative to solve this
problem. The wireless mesh clusters will form a DMNO
protocol based wireless Mesh Networks and to provide
wireless access service to the former mobile nodes without
demanding any additional function, the wireless mesh cluster
gateway will be based on an wireless infrastructure
environment. Also the managed mode mobile node should be
provided with continuous IP mobility as they move freely
across the Wireless mesh cluster gateway. This research
introduced an expanded multi-hop ARP method to provide
effective IP Mobility to mobile nodes by using proxy ARP and
DMNO protocol routing search procedures. Also the mobility
movement was embodied on the basis of linux system. As a
result, this research showed how this Heterogeneous wireless
mesh network can maximize the effectiveness of the network
and provided a guideline when designing a Wireless Mesh
Network.

6. References
[1] He, Z.L, Tsui, C.Y., Chan, K.K., and Liou, M.L.,
“Low-power VLSI design for motion estimation using
adaptive pixel truncation”, IEEE Trans. Circuit Syst.
Video Technol. 10(5):669-678, 2000.
[1] Song, Z., Roussopoulos, N. "K-Nearest Neighbor Search
for Moving Query Point".SSTD, 2001.
[2] Zheng B., Lee, D. "Semantic Cachng in Locatikdar, B.; "A
protocol for tracking mobile targets using sensor
networks". Proceedings of the First IEEE. 2003
Page(s):71 – 81

Das könnte Ihnen auch gefallen