A Novel Process to Avoid Redundant Encryption and Decryption in Wi-Fi Mesh Network

被引:0
作者
Thangadorai, Kavin Kumar [1 ]
Murugesan, Kumar [1 ]
Joseph, Vimal Bastin [1 ]
Das, Debabrata [2 ]
机构
[1] Bangalore Pvt Ltd, Android Connect Samsung R&D Inst India, Bangalore, Karnataka, India
[2] Int Inst Informat Technol Bangalore, Networking & Commun, Bangalore, Karnataka, India
来源
2018 IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTING AND COMMUNICATION TECHNOLOGIES (CONECCT) | 2018年
关键词
IEEE; 802.11s; Mesh Networking; Security;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Mesh topology is becoming popular in Wireless Local Area Network (WLAN) with Wi-Fi (TM). IEEE 802.11s is a well-known standard of Wi-Fi mesh networking. As we know, Mesh Access Points (APs) will be connected to each other in a Mesh topology and one of the Mesh APs will act as a Root AP, which will be connected to the Internet. IEEE 802.11 legacy client devices such as Mobile Phone, TV, and Laptop will be connected to any one of these Mesh APs. Since legacy client devices could transfer or receive sensitive user data, security becomes an important area to address in the Wi-Fi mesh network. As per 802.11s standard, each Mesh AP link will be secured by either applying Simultaneous Authentication of Equals (SAE) or 802.1X based authentication and encryption scheme. On the other hand, legacy client devices have to undergo either 802.1X or Pre-Shared Key (PSK) based security scheme with the Mesh AP. On a further note, when a packet arrives to Mesh AP entry from the legacy client has to be re-encrypted (decrypted and encrypted) by Mesh APs in each mesh hop until it reaches the Root AP to provide a secure communication, which is a redundant. This will add overhead in each mesh hop such as increase in mesh APs processing time and energy consumption. Various studies and proposals are made to further improve the link level security, but not for avoiding this redundant re-encryption in each mesh hops. To the best of our knowledge this paper for the first time proposes a new concept to overcome redundant re-encryption in each mesh hop by sharing the legacy client device's Pairwise Transient Key (PTK) to all the mesh APs in a secured mesh control plane. Our analytical and simulation results with this proposed concept reveals that the total processing time is improved around 20% and significant reduction in energy consumption in comparison to the existing system.
引用
收藏
页数:6
相关论文
共 38 条
  • [1] Dynamic Duplicate Deferral Techniques for Redundant Wi-Fi Networks
    Cena, Gianluca
    Scanzio, Stefano
    Valenzano, Adriano
    Zunino, Claudio
    2014 IEEE EMERGING TECHNOLOGY AND FACTORY AUTOMATION (ETFA), 2014,
  • [2] Network Throughput Improvement in Wi-Fi 6 over Wi-Fi 5: A Comparative Performance Analysis
    Bandyopadhyay, Dwaipayan
    De, Sammilita
    Roy, Sinjini Hom
    Biswas, Deepshikha
    Bhose, Madhura
    Karmakar, Raja
    2023 INTERNATIONAL CONFERENCE ON COMPUTER, ELECTRICAL & COMMUNICATION ENGINEERING, ICCECE, 2023,
  • [3] Duplication Avoidance Mechanisms to Reduce Bandwidth Usage in Redundant Wi-Fi Networks
    Cena, Gianluca
    Scanzio, Stefano
    Valenzano, Adriano
    2017 IEEE 13TH INTERNATIONAL WORKSHOP ON FACTORY COMMUNICATION SYSTEMS (WFCS 2017), 2017,
  • [4] Design and experimental performance analysis of a BATMAN-based double Wi-Fi interface mesh network
    Davoli, Luca
    Cilfone, Antonio
    Belli, Laura
    Ferrari, Gianluigi
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 92 : 593 - 603
  • [5] Improving Library User Experience: Wi-Fi Network Assessment
    Xu, Gordon F.
    Guo, Jin Xiu
    JOURNAL OF LIBRARY ADMINISTRATION, 2018, 58 (08) : 806 - 834
  • [6] Wi-Fi Network Analysis with a Large Number of Access Points
    Baranova, Elena A.
    Zareshin, Sergey V.
    Shevchenko, Nadezhda A.
    PROCEEDINGS OF THE 2019 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (EICONRUS), 2019, : 19 - 22
  • [7] Heterogeneous Wireless Network Based on Wi-Fi and ZigBee for Cattle Monitoring
    Nkwari, Patrick Kibambe Mashoko
    Rimer, S.
    Paul, B. S.
    Ferreira, H.
    2015 IST-AFRICA CONFERENCE, 2015,
  • [8] What Is the Fastest Way to Connect Stations to a Wi-Fi HaLow Network?
    Bankov, Dmitry
    Khorov, Evgeny
    Lyakhov, Andrey
    Stepanova, Ekaterina
    Tian, Le
    Famaey, Jeroen
    SENSORS, 2018, 18 (09)
  • [9] Characteristics Analysis for Corporate Wi-Fi Network Using the Buzen's Algorithm
    Kokoreva, Elena V.
    Shurygina, Ksenia I.
    ADVANCES IN ARTIFICIAL SYSTEMS FOR MEDICINE AND EDUCATION II, 2020, 902 : 693 - 704
  • [10] Survey of Algorithms and Techniques Used to Improve the Security of A Public Wi-Fi Network
    Aloufi, Hanouf
    Alsuwat, Hatim
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (06): : 194 - 202