Securing Remote Access Inside Wireless Mesh Networks

被引:0
|
作者
Manulis, Mark [1 ]
机构
[1] Tech Univ Darmstadt, Dept Comp Sci, Cryptog Protocols Grp, Darmstadt, Germany
来源
关键词
SEQUENTIAL AGGREGATE SIGNATURES; MULTISIGNATURES; RSA;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Wireless mesh networks (WMNs) that are being increasingly deployed in communities and public places provide a relatively stable routing infrastructure and can be used for diverse carrier-managed services. As a particular example we consider the scenario where a mobile device initially registered for the use with one wireless network (its home network) moves to the area covered by another network inside the same mesh. The goal is to establish a secure access to the home network using the infrastructure of the mesh. Classical mechanisms such as VPNs can protect end-to-end communication between the mobile device and its home network while remaining transparent to the routing infrastructure. In WMNs this transparency can be misused for packet injection leading to the unnecessary consumption of the communication bandwidth. This may have negative impact on the cooperation of mesh routers which is essential for the connection establishment. In this paper we describe how to establish remote connections inside WMNs while guaranteeing secure end-to-end communication between the mobile device and its home network and secure transmission of the corresponding packets along the underlying multi-hop path. Our solution is a provably secure, yet lightweight and round-optimal remote network access protocol in which intermediate mesh routers are considered to be part of the security architecture. We also sketch some ideas on the practical realization of the protocol using known standards and mention extensions with regard to forward secrecy, anonymity and accounting.
引用
收藏
页码:324 / 338
页数:15
相关论文
共 50 条
  • [1] Securing wireless mesh networks
    Glass, Steve
    Portmann, Marius
    Muthukkumarasamy, Vallipuram
    IEEE INTERNET COMPUTING, 2008, 12 (04) : 30 - 36
  • [2] Securing Locations of Mobile Nodes in Wireless Mesh Networks
    Alkhliwi, Sultan
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (11) : 70 - 81
  • [3] Securing Wireless Mesh Networks with Ticket-Based Authentication
    Qazi, Shams
    Mu, Yi
    Susilo, Willy
    ICSPCS: 2ND INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS, PROCEEDINGS, 2008, : 746 - 755
  • [4] Route Stability in Wireless Mesh Access Networks
    Ashraf, Usman
    Abdellatif, Slim
    Juanole, Guy
    EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 717 - 722
  • [5] Heterogeneous Wireless Access in Large Mesh Networks
    Liu, Haiping
    Liu, Xin
    Chuah, Chen-Nee
    Mohapatra, Prasant
    2008 FIFTH IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS, VOLS 1 AND 2, 2008, : 213 - 222
  • [6] Securing VoIP services in multi-hop wireless mesh networks
    Xian, Yi
    Huang, Chin-Tser
    2007 FOURTH INTERNATIONAL SYMPOSIUM ON WIRELESS COMMUNICATION SYSTEMS, VOLS 1 AND 2, 2007, : 397 - 401
  • [7] Securing Layer-2 Path Selection in Wireless Mesh Networks
    Islam, Md. Shariful
    Hamid, Md. Abdul
    Choi, Byung Goo
    Hong, Choong Seon
    INFORMATION SECURITY APPLICATIONS, 2009, 5379 : 69 - 83
  • [8] Delay and Throughput in Random Access Wireless Mesh Networks
    Bisnik, Nabhendra
    Abouzeid, Alhussein
    2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 403 - 408
  • [9] Cognitive wireless mesh networks with dynamic spectrum access
    Chowdhury, Kaushik R.
    Akyildiz, Ian F.
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2008, 26 (01) : 168 - 181
  • [10] Elucidating the Instability of Random Access Wireless Mesh Networks
    Aziz, Adel
    Starobinski, David
    Thiran, Patrick
    2009 6TH ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR, MESH AND AD HOC COMMUNICATIONS AND NETWORKS (SECON 2009), 2009, : 153 - +