A family of key agreement mechanisms for mission critical communications for secure mobile ad hoc and wireless mesh internetworking

  • Authors:
  • Ioannis G. Askoxylakis;Theo Tryfonas;John May;Vasilios Siris;Apostolos Traganitis

  • Affiliations:
  • Foundation for Reserach and Technology-Hellas, Institute of Computer Science, Heraklion, Greece and Faculty of Engineering, University of Bristol, Clifton, Bristol, UK;Faculty of Engineering, University of Bristol, Clifton, Bristol, UK;Faculty of Engineering, University of Bristol, Clifton, Bristol, UK;Foundation for Reserach and Technology-Hellas, Institute of Computer Science, Heraklion, Greece;Foundation for Reserach and Technology-Hellas, Institute of Computer Science, Heraklion, Greece

  • Venue:
  • EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Future wireless networks like mobile ad hoc networks and wireless mesh networks are expected to play important role in demanding communications such as mission critical communications. MANETs are ideal for emergency cases where the communication infrastructure has been completely destroyed and there is a need for quick set up of communications among the rescue/emergency workers. In such emergency scenarios wireless mesh networks may be employed in a later phase for providing advanced communications and services acting as a backbone network in the affected area. Internetworking of both types of future networks will provide a broad range of mission critical applications. While offering many advantages, such as flexibility, easy of deployment and low cost, MANETs and mesh networks face important security and resilience threats, especially for such demanding applications. We introduce a family of key agreement methods based on weak to strong authentication associated with several multiparty contributory key establishment methods. We examine the attributes of each key establishment method and how each method can be better applied in different scenarios. The proposed protocols support seamlessly both types of networks and consider system and application requirements such as efficient and secure internetworking, dynamicity of network topologies and support of thin clients.