Encryption in Mobile Wireless Mesh Networks

被引:0
作者
Witzke, Edward L. [1 ]
Brenkosh, Joseph P. [1 ]
Green, Karl L. [1 ]
Riblett, Loren E. [1 ]
Wiseman, James M. [1 ]
机构
[1] Sandia Natl Labs, Albuquerque, NM 87185 USA
来源
46TH ANNUAL 2012 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY | 2012年
关键词
encryption; mobile; wireless; mesh networks;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Wireless mesh networks (WMNs) are growing in popularity because of their inherent robustness, versatility, and ease of deployment in situations such as natural or man-made disasters. Another area of potential use for these networks is in physical security systems where they can potentially improve mobile communications, communications with remote locations, temporary communications, and geolocation applications. Since these physical security systems may employ a mobile WMN to transport sensitive or classified information, questions arise as to whether end-to-end encryption would work within a very dynamic WMN. We could not find published data or results concerning this. Therefore, we set out to find whether end-to-end encryption will continue to work through an ever-changing W MN. We examined the behavior of end-to-end encryption when the path through the wireless network changes (that is, when routing is forced through a different intermediate node or nodes) and when traversing a radio frequency (RF) shadow. We especially wished to determine whether a tunnel, as used in software virtual private networks (VPNs) or hardware encryption devices, would survive RF shadow transits and mesh network topology changes. This paper presents an introduction to WMNs, their applicability to physical security systems, our end-to-end encryption experiments, analysis of the results, and our conclusions.
引用
收藏
页码:251 / 256
页数:6
相关论文
共 6 条
[1]   A survey on wireless mesh networks [J].
Akyildiz, IF ;
Wang, XD .
IEEE COMMUNICATIONS MAGAZINE, 2005, 43 (09) :S23-S30
[2]  
[Anonymous], 2007, NAT POL GOV US HIGH
[3]  
Malik S., 2003, Network security principles and practices
[4]  
Prichard Sharon, 2008, DISE RES GR IN PRESS, V14
[5]  
Richard Woods, 2008, TRIDENT WARRIOR 2008
[6]  
Witzke, 2010, P 44 ANN INT CAM C S