Applicability of crypto-based security approaches in tactical wireless multi-hop networks | IEEE Conference Publication | IEEE Xplore

Applicability of crypto-based security approaches in tactical wireless multi-hop networks


Abstract:

Security is one of the core challenges especially for wireless multi-hop networks in public safety scenarios. Sensitive data is transmitted via insecure links. Furthermor...Show More

Abstract:

Security is one of the core challenges especially for wireless multi-hop networks in public safety scenarios. Sensitive data is transmitted via insecure links. Furthermore, there may be competing interests. Thus, there is a high probability of disturbance or eavesdropping of communication. Confidentiality, integrity, and authenticity of transmitted packets can be provided by cryptographic means. However, as the devices used in multi-hop networks are usually resource constrained, the goal of this paper is to scrutinize the feasibility of securing such networks using strong but computationally expensive cryptography. In this paper, we show generic benchmarking results for tactical multi-hop network devices as well as a case study comparing two routing security approaches.
Date of Conference: 22-25 October 2012
Date Added to IEEE Xplore: 31 January 2013
ISBN Information:

ISSN Information:

Conference Location: Clearwater Beach, FL, USA

Contact IEEE to Subscribe

References

References is not available for this document.