International Journal for Research in Applied Science & Engineering Technology (IJRASET) ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.429 Volume 8 Issue IV Apr 2020- Available at www.ijraset.com 889 ©IJRASET: All Rights are Reserved Analysis of Routing and Secure Routing in Hybrid Wireless Mesh Networks Ganesh Reddy Karri 1 , Gunotham Solanki 2 , Mohammed Yaseen Khan 3 1, 2, 3 School of Computer Science and Engineering VIT-AP University, Amaravati, India, Abstract: Interoperability is one of the main characteristics of Hybrid Wireless Mesh Networks (HWMNs). In HWMNs, network devices have different resource constrains; identifying optimal paths over the heterogeneous environment is a challenging task. Reactive and proactive routing protocols of Ad-Hoc and sensor networks are ineffective in terms of scalability, thus researchers have come up with new routing protocols like cross-layer, and load-balancing protocols. However, these protocols fail to provide basic security to the network, a very few protocols have addressed the security in HWMNs, each of the secure protocol has its own limitations. In this paper, we analyze the issues in HWMNs routing protocols, and the security issues in proactive, reactive and hybrid protocols with respect to various network layer attacks. Based on our analysis, we have proposed the new research directions in terms of improving HWMNs routing functionality in the heterogeneous environment and new security dimensions for optimizing the network node resources and security mechanisms in HWMNs. Keywords: Interoperability, wireless mesh, core layer attacks, detection, prevention. I. INTRODUCTION HWMN has becoming more popular because it has wide verity of applications like IoT, Ad-Hoc network, sensor network, and Vehicular networks. Network routers in HWMNs have different processing speed, queue size, energy levels, memory, and bandwidth constraints. Based on these constraints, network nodes are mainly classified into three types: Gateways, mesh routers (core routers), and clients. Gateways nodes support both wired and wireless connection other than internet connection. Mesh routers, most of the cases these are wireless routers with different capacities, form a backbone network. Mesh clients can be an ad-hoc node, IoT device, a sensor device, basically, these devices are different from conventional wireless devices[1][2]. Mesh clients support multi-hop communication and each client acts has router to forward the data in the client mesh network[3]-[6]. As per the current technology, two different client networks can’t connect directly, but they can communicate through backbone mesh routers. In HWMNs, network efficiency mainly depends on selecting the best route which has high throughput, low latency and less error rate to transmit the packets. The existing classical routing protocols are mainly classified into three types: proactive, reactive and hybrid routing protocol. These routing protocols consider the hop count, bandwidth, and delay metrics to form a route between source and destination node. Once a route is established for data communication, this route is fixed for the entire communication [12]-[19]. On the other hand, computational intelligence routing protocols establish the paths based on congestion, trust, and load balancing metrics, in addition to this, these routing paths are updated based on the requirement. The existing routing protocols are inefficient to support the complete interoperability of HWMNs. However, we use the existing protocols to run the applications over the HWMNs also topology of the network is highly dynamic due to mesh routers/clients are often join/leave the network at any time, these problems lead to various vulnerabilities at routing. Attackers identify the routing vulnerabilities to implement various types of control and data plane attacks. These attacks severely degrade the network performance if the existing routing protocols fail to address their security vulnerabilities. We mainly use intrusion prevention and detection approaches to address the vulnerabilities. In intrusion prevention, we have studied existing proactive, reactive and hybrid secure routing protocols with respect to various network layer attacks. We studied specific trust-based routing protocols with respect to these attacks at backbone mesh and client mesh as the intrusion detection mechanisms. Based on our analysis, we have given the research directions which can mitigate the severity of the attacks. The rest of the paper as follows, section II demonstrates routing protocols issues, and Section III the explains intrusion prevention mechanisms and intrusion detection mechanisms, section IV elevates the research directions in terms of HWMNs security. Section V concludes this paper.