Abstract
Wireless mesh networks (WMNs) are currently accepted as a new communication paradigm for next-generation wireless networking. They consist of mesh routers and clients, where mesh routers are almost static and form the backbone of WMNs.
Several architectures have been proposed to distribute the authentication and authorization functions in the WMN backbone. In such distributed architectures, new mesh routers authenticate to a key management service (consisting of several servers, named core nodes), which can be implemented using threshold cryptography, and obtain a temporary key that is used both to prove their credentials to neighbor nodes and to encrypt all the traffic transmitted on wireless backbone links.
This paper analyzes the optimal placement of the core nodes that collaboratively implement the key management service in a distributed wireless security architecture. The core node placement is formulated as an optimization problem, which models closely the behavior of real wireless channels; the performance improvement achieved solving our model is then evaluated in terms of key distribution/authentication delay in several realistic network scenarios.
Numerical results show that our proposed model increases the responsiveness of distributed security architectures with a short computing time, thus representing a very effective tool to plan efficient and secure wireless networks.
Chapter PDF
Similar content being viewed by others
References
Akyildiz, I.F., Wang, X., Wang, W.: Wireless mesh networks: a survey. Elsevier Computer Networks 47(4), 445–487 (2005)
IEEE Standard 802.11i. Medium Access Control (MAC) security enhancements, amendment 6. IEEE Computer Society (2004)
Zhang, Y., Fang, Y.: Arsa: An attack-resilient security architecture for multihop wireless mesh networks. IEEE Journal on Selected Areas in Communications 24(10), 1916–1928 (2006)
Martignon, F., Paris, S., Capone, A.: Design and Implementation of MobiSEC: a Complete Security Architecture for Wireless Mesh Networks. Elsevier Computer Networks 53(12), 2192–2207 (2009)
Yi, S., Kravets, R.: Moca: Mobile certificate authority for wireless ad hoc networks. In: Annual PKI Research Workshop, PKI 2003 (2003)
Kim, J., Bahk, S.: Meca: Distributed certification authority in wireless mesh networks. In: IEEE CCNC, pp. 267–271 (2008)
Martignon, F., Paris, S., Capone, A.: DSA-Mesh: a Distributed Security Architecture for Wireless Mesh Networks. Wiley Security and Communication Networks 4(3), 242–256 (2011)
Luo, H., Zerfos, P., Kong, J., Lu, S., Zhang, L.: Self-securing ad hoc wireless networks. In: IEEE ISCC, pp. 567–574 (2002)
Xu, G., Iftode, L.: Locality driven key management architecture for mobile ad-hoc networks. In: IEEE MASS, pp. 436–446 (2004)
Capkun, S., Buttyan, L., Hubaux, J.-P.: Self-organized public-key management for mobile ad hoc networks. IEEE Trans. on Mobile Computing, 52–64 (2003)
Wua, B., Wua, J., Fernandeza, E.B., Ilyasa, M., Magliveras, S.: Secure and efficient key management in mobile ad hoc networks. In: IEEE IPDPS (2005)
Nauss, R.M.: An improved algorithm for the capacitated facility location problem. Journal of the Operational Research Society 29(12), 1195–1201 (1978)
Aoun, B., Boutaba, R., Iraqi, Y., Kenward, G.: Gateway placement optimization in wireless mesh networks with QoS constraints. IEEE Journal on Selected Areas in Communications 24(11), 2127–2136 (2006)
Targon, V., Sansò, B., Capone, A.: The joint Gateway Placement and Spatial Reuse Problem in Wireless Mesh Networks. Computer Networks (2009)
He, B., Xie, B., Agrawal, D.P.: Optimizing the Internet gateway deployment in a wireless mesh network. In: IEEE MASS (2007)
Amaldi, E., Capone, A., Cesana, M., Filippini, I., Malucelli, F.: Optimization models and methods for planning wireless mesh networks. Computer Networks 52(11), 2159–2171 (2008)
Khuller, S., Pless, R., Sussmann, Y.J.: Fault tolerant k-center problems. Theoretical Computer Science 242(1), 237–246 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 IFIP International Federation for Information Processing
About this paper
Cite this paper
Martignon, F., Paris, S., Capone, A. (2011). Optimal Node Placement in Distributed Wireless Security Architectures. In: Domingo-Pascual, J., Manzoni, P., Palazzo, S., Pont, A., Scoglio, C. (eds) NETWORKING 2011. NETWORKING 2011. Lecture Notes in Computer Science, vol 6640. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20757-0_25
Download citation
DOI: https://doi.org/10.1007/978-3-642-20757-0_25
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-20756-3
Online ISBN: 978-3-642-20757-0
eBook Packages: Computer ScienceComputer Science (R0)