A Novel Process to Avoid Redundant Encryption and Decryption in Wi-Fi Mesh Network

被引:0
作者
Thangadorai, Kavin Kumar [1 ]
Murugesan, Kumar [1 ]
Joseph, Vimal Bastin [1 ]
Das, Debabrata [2 ]
机构
[1] Bangalore Pvt Ltd, Android Connect Samsung R&D Inst India, Bangalore, Karnataka, India
[2] Int Inst Informat Technol Bangalore, Networking & Commun, Bangalore, Karnataka, India
来源
2018 IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTING AND COMMUNICATION TECHNOLOGIES (CONECCT) | 2018年
关键词
IEEE; 802.11s; Mesh Networking; Security;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Mesh topology is becoming popular in Wireless Local Area Network (WLAN) with Wi-Fi (TM). IEEE 802.11s is a well-known standard of Wi-Fi mesh networking. As we know, Mesh Access Points (APs) will be connected to each other in a Mesh topology and one of the Mesh APs will act as a Root AP, which will be connected to the Internet. IEEE 802.11 legacy client devices such as Mobile Phone, TV, and Laptop will be connected to any one of these Mesh APs. Since legacy client devices could transfer or receive sensitive user data, security becomes an important area to address in the Wi-Fi mesh network. As per 802.11s standard, each Mesh AP link will be secured by either applying Simultaneous Authentication of Equals (SAE) or 802.1X based authentication and encryption scheme. On the other hand, legacy client devices have to undergo either 802.1X or Pre-Shared Key (PSK) based security scheme with the Mesh AP. On a further note, when a packet arrives to Mesh AP entry from the legacy client has to be re-encrypted (decrypted and encrypted) by Mesh APs in each mesh hop until it reaches the Root AP to provide a secure communication, which is a redundant. This will add overhead in each mesh hop such as increase in mesh APs processing time and energy consumption. Various studies and proposals are made to further improve the link level security, but not for avoiding this redundant re-encryption in each mesh hops. To the best of our knowledge this paper for the first time proposes a new concept to overcome redundant re-encryption in each mesh hop by sharing the legacy client device's Pairwise Transient Key (PTK) to all the mesh APs in a secured mesh control plane. Our analytical and simulation results with this proposed concept reveals that the total processing time is improved around 20% and significant reduction in energy consumption in comparison to the existing system.
引用
收藏
页数:6
相关论文
共 38 条
  • [21] Estimation of the Wi-Fi Network Capacity when Using Restricted Access Window with Short Slots
    Zazhigina, E. A.
    Yusupov, R. R.
    Khorov, E. M.
    Lyakhov, A. I.
    JOURNAL OF COMMUNICATIONS TECHNOLOGY AND ELECTRONICS, 2022, 67 (SUPPL 1) : S176 - S184
  • [22] An Advanced Wi-Fi Data Service Platform Coupled with a Cellular Network for Future Wireless Access
    Kudo, Riichi
    Takatori, Yasushi
    Abeysekera, B. A. Hirantha Sithira
    Inoue, Yasuhiko
    Murase, Atsushi
    Yamada, Akira
    Yasuda, Hiroto
    Okumura, Yukihiko
    IEEE COMMUNICATIONS MAGAZINE, 2014, 52 (11) : 46 - 53
  • [23] Consumer Adoption of Wi-Fi Network: The Role of Security Knowledge, Perceived Threat and Security Measures
    Zhan, Ge
    Wong, Ada Hiu Kan
    PROCEEDINGS OF THE 2017 8TH INTERNATIONAL CONFERENCE ON E-EDUCATION, E-BUSINESS, E-MANAGEMENT AND E-LEARNING (IC4E 2017), 2015, : 1 - 5
  • [24] Estimation of the Wi-Fi Network Capacity when Using Restricted Access Window with Short Slots
    Zazhigina, E. A.
    Yusupov, R. R.
    Khorov, E. M.
    Lyakhov, A. I.
    JOURNAL OF COMMUNICATIONS TECHNOLOGY AND ELECTRONICS, 2022, 67 (SUPPL 2) : S201 - S210
  • [25] Performance Analysis of Periodic Busy Tones Protecting a ZigBee Network from Wi-Fi Interruption
    Ock, Jinwoo
    Choi, Young-June
    Bahk, Saewoong
    2014 IEEE 79TH VEHICULAR TECHNOLOGY CONFERENCE (VTC-SPRING), 2014,
  • [26] Novel Modification of the Collective Dynamic Routing Method for Sensors' Communication in Wi-Fi Public Networks
    Kozlov, Sergey
    Spirina, Elena
    Ashaev, Ivan
    Bukharina, Anna
    Gaysin, Artur
    SENSORS, 2022, 22 (22)
  • [27] From Digital Divide to Information Availability: A Wi-Fi Based Novel Solution for Information Dissemination
    Majeed, Muhammad Faran
    Abbasi, Irshad Ahmed
    Ali, Sikandar
    Mustafa, Elfatih Elmubarak
    Hussain, Ibrar
    Saeed, Khalid
    Abrar, Muhammad Faisal
    No, Mah E.
    Khattak, Muhammad Kashif
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021 (2021)
  • [28] Wideband Printed Monopole Antenna for Wi-Fi 6E Devices with Broadband Matching Network
    Percy, J. Joslin
    Murty, V. S. S. C. S.
    Narayan, K. G. Sujanth
    Baskaradas, James A.
    2021 SIXTH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2021, : 309 - 314
  • [29] Time Synchronization Method of Low-Voltage Distribution Network Based on Wi-Fi and Voltage Detection
    Xue, Bolin
    Chen, Yu
    Altameem, Torki
    JOURNAL OF NANOELECTRONICS AND OPTOELECTRONICS, 2023, 18 (04) : 468 - 478
  • [30] Hardware Efficient Clock Synchronization Across Wi-Fi and Ethernet-Based Network Using PTP
    Aslam, Muhammad
    Liu, Wei
    Jiao, Xianjun
    Haxhibeqiri, Jetmir
    Miranda, Gilson
    Hoebeke, Jeroen
    Marquez-Barja, Johann
    Moerman, Ingrid
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (06) : 3808 - 3819