Wireless mesh networks (WMNs) are currently accepted as a new communication paradigm for next-generation wireless networking. They consist of mesh routers and clients, where mesh routers are almost static and form the backbone of WMNs. Several architectures have been proposed to distribute the authentication and authorization functions in the WMN backbone. In such distributed architectures, new mesh routers authenticate to a key management ser- vice (consisting of several servers, named core nodes), which can be im- plemented using threshold cryptography, and obtain a temporary key that is used both to prove their credentials to neighbor nodes and to encrypt all the traffic transmitted on wireless backbone links. This paper analyzes the optimal placement of the core nodes that collab- oratively implement the key management service in a distributed wireless security architecture. The core node placement is formulated as an op- timization problem, which models closely the behavior of real wireless channels; the performance improvement achieved solving our model is then evaluated in terms of key distribution/authentication delay in sev- eral realistic network scenarios. Numerical results show that our proposed model increases the responsive- ness of distributed security architectures with a short computing time, thus representing a very effective tool to plan efficient and secure wireless networks.
Optimal Node Placement in Distributed Wireless Security Architectures
PARIS, STEFANO;CAPONE, ANTONIO
2011-01-01
Abstract
Wireless mesh networks (WMNs) are currently accepted as a new communication paradigm for next-generation wireless networking. They consist of mesh routers and clients, where mesh routers are almost static and form the backbone of WMNs. Several architectures have been proposed to distribute the authentication and authorization functions in the WMN backbone. In such distributed architectures, new mesh routers authenticate to a key management ser- vice (consisting of several servers, named core nodes), which can be im- plemented using threshold cryptography, and obtain a temporary key that is used both to prove their credentials to neighbor nodes and to encrypt all the traffic transmitted on wireless backbone links. This paper analyzes the optimal placement of the core nodes that collab- oratively implement the key management service in a distributed wireless security architecture. The core node placement is formulated as an op- timization problem, which models closely the behavior of real wireless channels; the performance improvement achieved solving our model is then evaluated in terms of key distribution/authentication delay in sev- eral realistic network scenarios. Numerical results show that our proposed model increases the responsive- ness of distributed security architectures with a short computing time, thus representing a very effective tool to plan efficient and secure wireless networks.File | Dimensione | Formato | |
---|---|---|---|
Networking2011.pdf
Accesso riservato
:
Pre-Print (o Pre-Refereeing)
Dimensione
220.75 kB
Formato
Adobe PDF
|
220.75 kB | Adobe PDF | Visualizza/Apri |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.