Applicability of crypto-based security approaches in tactical wireless multi-hop networks
Autor(en): | Aschenbruck, N. Gerhards-Padilla, E. Lambertz, M. |
Stichwörter: | Cryptography; High probability; Multihop networks; Public safety; Routing security; Security approach; Security Approaches; Sensitive datas; Tactical Wireless Multi-hop Networks; Wireless multi-hop network, Cryptography, Wireless networks | Erscheinungsdatum: | 2012 | Journal: | Proceedings - Conference on Local Computer Networks, LCN | Startseite: | 102 | Seitenende: | 110 | Zusammenfassung: | Security is one of the core challenges especially for wireless multi-hop networks in public safety scenarios. Sensitive data is transmitted via insecure links. Furthermore, there may be competing interests. Thus, there is a high probability of disturbance or eavesdropping of communication. Confidentiality, integrity, and authenticity of transmitted packets can be provided by cryptographic means. However, as the devices used in multi-hop networks are usually resource constrained, the goal of this paper is to scrutinize the feasibility of securing such networks using strong but computationally expensive cryptography. In this paper, we show generic benchmarking results for tactical multi-hop network devices as well as a case study comparing two routing security approaches. © 2012 IEEE. |
Beschreibung: | Conference of 37th Annual IEEE Conference on Local Computer Networks, LCN 2012 ; Conference Date: 22 October 2012 Through 25 October 2012; Conference Code:95762 |
ISBN: | 9781467315647 | DOI: | 10.1109/LCN.2012.6423584 | Externe URL: | https://www.scopus.com/inward/record.uri?eid=2-s2.0-84874302345&doi=10.1109%2fLCN.2012.6423584&partnerID=40&md5=8e87487e7a8cec04d252a55d699e0c8a |
Zur Langanzeige
Seitenaufrufe
19
Letzte Woche
0
0
Letzter Monat
0
0
geprüft am 18.05.2024