Securing Remote Access Inside Wireless Mesh Networks

被引:0
|
作者
Manulis, Mark [1 ]
机构
[1] Tech Univ Darmstadt, Dept Comp Sci, Cryptog Protocols Grp, Darmstadt, Germany
来源
关键词
SEQUENTIAL AGGREGATE SIGNATURES; MULTISIGNATURES; RSA;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Wireless mesh networks (WMNs) that are being increasingly deployed in communities and public places provide a relatively stable routing infrastructure and can be used for diverse carrier-managed services. As a particular example we consider the scenario where a mobile device initially registered for the use with one wireless network (its home network) moves to the area covered by another network inside the same mesh. The goal is to establish a secure access to the home network using the infrastructure of the mesh. Classical mechanisms such as VPNs can protect end-to-end communication between the mobile device and its home network while remaining transparent to the routing infrastructure. In WMNs this transparency can be misused for packet injection leading to the unnecessary consumption of the communication bandwidth. This may have negative impact on the cooperation of mesh routers which is essential for the connection establishment. In this paper we describe how to establish remote connections inside WMNs while guaranteeing secure end-to-end communication between the mobile device and its home network and secure transmission of the corresponding packets along the underlying multi-hop path. Our solution is a provably secure, yet lightweight and round-optimal remote network access protocol in which intermediate mesh routers are considered to be part of the security architecture. We also sketch some ideas on the practical realization of the protocol using known standards and mention extensions with regard to forward secrecy, anonymity and accounting.
引用
收藏
页码:324 / 338
页数:15
相关论文
共 50 条
  • [21] Extensions of the Access Point Allocation Algorithm for Wireless Mesh Networks
    Hassan, Walaa
    Funabiki, Nobuo
    Nakanishi, Toru
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2010, E93B (06) : 1555 - 1565
  • [22] On the access pricing and network scaling issues of wireless mesh networks
    Lam, Ray K.
    Chiu, Dah-Ming
    Lui, John C. S.
    IEEE TRANSACTIONS ON COMPUTERS, 2007, 56 (11) : 1456 - 1469
  • [23] Access scheduling on the control channels in TDMA wireless mesh networks
    Cheng, Hongju
    Jia, Xiaohua
    Liu, Hai
    MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2007, 4864 : 421 - +
  • [24] Determined scheduling algorithms for channel access in wireless mesh networks
    Cheng, Hongju
    Chen, Guolong
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 277 - 282
  • [25] Access scheduling on the control channels in TDMA wireless mesh networks
    Cheng, Hongju
    ICISS 2008: INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY, PROCEEDINGS, 2008, : 3 - 12
  • [26] Sharing Online Video Streams in Wireless Mesh Access Networks
    Xie, Fei
    Hua, Kien A.
    2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011), 2011,
  • [27] Adaptive medium access control for hybrid Wireless Mesh Networks
    Yu, Oliver
    Li, Anfei
    Saric, Emir
    2007 IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-9, 2007, : 435 - 440
  • [28] A power efficient access method by polling for wireless mesh networks
    Fuji Electric Systems Co., Ltd., 1, Fuji-machi, Hino-city, Tokyo 191-8502, Japan
    不详
    IEEJ Trans. Electron. Inf. Syst., 2008, 12 (1761-1766+6):
  • [29] Space division competitive access for infrastructured wireless mesh networks
    Baccarelli, Enzo
    Biagi, Mauro
    Pelizzoni, Cristian
    Cordeschi, Nicola
    2007 SECOND INTERNATIONAL CONFERENCE ON ACCESS NETWORKS & WORKSHOPS, 2007, : 188 - 195
  • [30] An access authentication protocol for trusted handoff in wireless mesh networks
    Xiao, Peng
    He, Jingsha
    Fu, Yingfang
    COMPUTER STANDARDS & INTERFACES, 2014, 36 (03) : 480 - 488