SPINS: security protocols for sensor networks
Wireless Networks
A Secure Routing Protocol for Ad Hoc Networks
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Self-Securing Ad Hoc Wireless Networks
ISCC '02 Proceedings of the Seventh International Symposium on Computers and Communications (ISCC'02)
A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP)
ACM Transactions on Information and System Security (TISSEC)
An advanced signature system for OLSR
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Distributed Detection of Node Replication Attacks in Sensor Networks
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Wireless mesh networks: a survey
Computer Networks and ISDN Systems
Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks
WMuNeP '05 Proceedings of the 1st ACM workshop on Wireless multimedia networking and performance modeling
Ariadne: a secure on-demand routing protocol for ad hoc networks
Wireless Networks
ISPAN '08 Proceedings of the The International Symposium on Parallel Architectures, Algorithms, and Networks
Securing wireless mesh networks
IEEE Wireless Communications
A modified remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
New remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
Mesh networks: commodity multihop ad hoc networks
IEEE Communications Magazine
IEEE Network: The Magazine of Global Internetworking
A framework for detecting selfish misbehavior in wireless mesh community networks
Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks
Implementation of a security framework for wireless multi-hop networks
Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks
Journal of Network and Computer Applications
Optimal node placement in distributed wireless security architectures
NETWORKING'11 Proceedings of the 10th international IFIP TC 6 conference on Networking - Volume Part I
Security model for emergency real-time communications in autonomous networks
Information Systems Frontiers
Hi-index | 0.00 |
Wireless mesh networks (WMNs) have emerged recently as a technology for next-generation wireless networking. They consist of mesh routers and clients, where mesh routers are almost static and form the backbone of WMNs. WMNs provide network access for both mesh and conventional clients. In this paper we propose MobiSEC, a complete security architecture that provides both access control for mesh users and routers as well as a key distribution scheme that supports layer-2 encryption to ensure security and data confidentiality of all communications that occur in the WMN. MobiSEC extends the IEEE 802.11i standard exploiting the routing capabilities of mesh routers; after connecting to the access network as generic wireless clients, new mesh routers authenticate to a central server and obtain a temporary key that is used both to prove their credentials to neighbor nodes and to encrypt all the traffic transmitted on the wireless backbone links. A key feature in the design of MobiSEC is its independence from the underlying wireless technology used by network nodes to form the backbone. Furthermore, MobiSEC allows seamless mobility of both mesh clients and routers. MobiSEC has been implemented and integrated in MobiMESH, a WMN implementation that provides a complete framework for testing and analyzing the behavior of a mesh network in real-life environments. Moreover, extensive simulations have been performed in large-scale network scenarios using Network Simulator. Numerical results show that our proposed architecture considerably increases the WMN security, with a negligible impact on the network performance, thus representing an effective solution for wireless mesh networking.