N. Aschenbruck, E. Gerhards-Padilla, Martin Lambertz
{"title":"Applicability of crypto-based security approaches in tactical wireless multi-hop networks","authors":"N. Aschenbruck, E. Gerhards-Padilla, Martin Lambertz","doi":"10.1109/LCN.2012.6423584","DOIUrl":null,"url":null,"abstract":"Security is one of the core challenges especially for wireless multi-hop networks in public safety scenarios. Sensitive data is transmitted via insecure links. Furthermore, there may be competing interests. Thus, there is a high probability of disturbance or eavesdropping of communication. Confidentiality, integrity, and authenticity of transmitted packets can be provided by cryptographic means. However, as the devices used in multi-hop networks are usually resource constrained, the goal of this paper is to scrutinize the feasibility of securing such networks using strong but computationally expensive cryptography. In this paper, we show generic benchmarking results for tactical multi-hop network devices as well as a case study comparing two routing security approaches.","PeriodicalId":209071,"journal":{"name":"37th Annual IEEE Conference on Local Computer Networks","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"37th Annual IEEE Conference on Local Computer Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/LCN.2012.6423584","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Security is one of the core challenges especially for wireless multi-hop networks in public safety scenarios. Sensitive data is transmitted via insecure links. Furthermore, there may be competing interests. Thus, there is a high probability of disturbance or eavesdropping of communication. Confidentiality, integrity, and authenticity of transmitted packets can be provided by cryptographic means. However, as the devices used in multi-hop networks are usually resource constrained, the goal of this paper is to scrutinize the feasibility of securing such networks using strong but computationally expensive cryptography. In this paper, we show generic benchmarking results for tactical multi-hop network devices as well as a case study comparing two routing security approaches.