Wireless mesh networks (WMNs) are currently accepted as a new communication paradigm for next-generation wireless networking. They consist of mesh routers and clients, where mesh routers are almost static and form the backbone of WMNs. Several architectures have been proposed to distribute the authentication and authorization functions in the WMN backbone. In such distributed architectures, new mesh routers authenticate to a key management ser- vice (consisting of several servers, named core nodes), which can be im- plemented using threshold cryptography, and obtain a temporary key that is used both to prove their credentials to neighbor nodes and to encrypt all the traffic transmitted on wireless backbone links. This paper analyzes the optimal placement of the core nodes that collab- oratively implement the key management service in a distributed wireless security architecture. The core node placement is formulated as an op- timization problem, which models closely the behavior of real wireless channels; the performance improvement achieved solving our model is then evaluated in terms of key distribution/authentication delay in sev- eral realistic network scenarios. Numerical results show that our proposed model increases the responsive- ness of distributed security architectures with a short computing time, thus representing a very effective tool to plan efficient and secure wireless networks.

Optimal Node Placement in Distributed Wireless Security Architectures

PARIS, STEFANO;CAPONE, ANTONIO
2011-01-01

Abstract

Wireless mesh networks (WMNs) are currently accepted as a new communication paradigm for next-generation wireless networking. They consist of mesh routers and clients, where mesh routers are almost static and form the backbone of WMNs. Several architectures have been proposed to distribute the authentication and authorization functions in the WMN backbone. In such distributed architectures, new mesh routers authenticate to a key management ser- vice (consisting of several servers, named core nodes), which can be im- plemented using threshold cryptography, and obtain a temporary key that is used both to prove their credentials to neighbor nodes and to encrypt all the traffic transmitted on wireless backbone links. This paper analyzes the optimal placement of the core nodes that collab- oratively implement the key management service in a distributed wireless security architecture. The core node placement is formulated as an op- timization problem, which models closely the behavior of real wireless channels; the performance improvement achieved solving our model is then evaluated in terms of key distribution/authentication delay in sev- eral realistic network scenarios. Numerical results show that our proposed model increases the responsive- ness of distributed security architectures with a short computing time, thus representing a very effective tool to plan efficient and secure wireless networks.
2011
File in questo prodotto:
File Dimensione Formato  
Networking2011.pdf

Accesso riservato

: Pre-Print (o Pre-Refereeing)
Dimensione 220.75 kB
Formato Adobe PDF
220.75 kB Adobe PDF   Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11311/577878
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 2
  • ???jsp.display-item.citation.isi??? ND
social impact