Securing Remote Access Inside Wireless Mesh Networks

被引:0
|
作者
Manulis, Mark [1 ]
机构
[1] Tech Univ Darmstadt, Dept Comp Sci, Cryptog Protocols Grp, Darmstadt, Germany
来源
关键词
SEQUENTIAL AGGREGATE SIGNATURES; MULTISIGNATURES; RSA;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Wireless mesh networks (WMNs) that are being increasingly deployed in communities and public places provide a relatively stable routing infrastructure and can be used for diverse carrier-managed services. As a particular example we consider the scenario where a mobile device initially registered for the use with one wireless network (its home network) moves to the area covered by another network inside the same mesh. The goal is to establish a secure access to the home network using the infrastructure of the mesh. Classical mechanisms such as VPNs can protect end-to-end communication between the mobile device and its home network while remaining transparent to the routing infrastructure. In WMNs this transparency can be misused for packet injection leading to the unnecessary consumption of the communication bandwidth. This may have negative impact on the cooperation of mesh routers which is essential for the connection establishment. In this paper we describe how to establish remote connections inside WMNs while guaranteeing secure end-to-end communication between the mobile device and its home network and secure transmission of the corresponding packets along the underlying multi-hop path. Our solution is a provably secure, yet lightweight and round-optimal remote network access protocol in which intermediate mesh routers are considered to be part of the security architecture. We also sketch some ideas on the practical realization of the protocol using known standards and mention extensions with regard to forward secrecy, anonymity and accounting.
引用
收藏
页码:324 / 338
页数:15
相关论文
共 50 条
  • [31] Mesh networks; a new architecture for Broadband Wireless Access systems
    Whitehead, P
    RAWCON2000: 2000 IEEE RADIO AND WIRELESS CONFERENCE, PROCEEDINGS, 2000, : 43 - 46
  • [32] Securing Internet gateway discovery protocol in ubiquitous wireless Internet access networks
    Park, Bok-Nyong
    Lee, Wonjun
    Shin, Christian
    EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2006, 4096 : 318 - 327
  • [33] Securing wireless sensor networks
    Yi, Xun
    Faulkner, Mike
    Okamoto, Eiji
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 497 - +
  • [34] A robust authentication and access control protocol for securing wireless healthcare sensor networks
    Ali, Zeeshan
    Ghani, Anwar
    Khan, Imran
    Chaudhry, Shehzad Ashraf
    Islam, S. K. Hafizul
    Giri, Debasis
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 52
  • [35] ZigBee Wireless Mesh Networks for Remote Monitoring System of Pumping Unit
    Gao, Meijuan
    Xu, Jin
    Tian, Jingwen
    Zhang, Fan
    2008 7TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-23, 2008, : 5901 - +
  • [36] Software-defined wireless mesh networks for internet access sharing
    Abujoda, Ahmed
    Dietrich, David
    Papadimitriou, Panagiotis
    Sathiaseelan, Arjuna
    COMPUTER NETWORKS, 2015, 93 : 359 - 372
  • [37] Distributed scheduling algorithms for channel access in TDMA wireless mesh networks
    Cheng, Hongju
    Xiong, Naixue
    Yang, Larence T.
    Jeong, Young-Sik
    JOURNAL OF SUPERCOMPUTING, 2008, 45 (01): : 105 - 128
  • [38] A Proposal and Evaluation of Access Point Allocation Algorithm for Wireless Mesh Networks
    Hoshi, Takuma
    Kumata, Yuki
    Koyama, Akio
    2013 16TH INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS (NBIS 2013), 2013, : 389 - 394
  • [39] Distributed scheduling algorithms for channel access in TDMA wireless mesh networks
    Hongju Cheng
    Naixue Xiong
    Larence T. Yang
    Young-Sik Jeong
    The Journal of Supercomputing, 2008, 45 : 105 - 128
  • [40] Access authentication scheme based on authorized certificate in wireless mesh networks
    Luan, Liangyu
    Fu, Yingfang
    Xiao, Peng
    Journal of Networks, 2014, 9 (01) : 231 - 237