DocumentCode :
2702132
Title :
Encryption in mobile wireless mesh networks
Author :
Witzke, Edward L. ; Brenkosh, Joseph P. ; Green, Karl L. ; Riblett, Loren E. ; Wiseman, James M.
Author_Institution :
Sandia Nat. Labs., Albuquerque, NM, USA
fYear :
2012
fDate :
15-18 Oct. 2012
Firstpage :
251
Lastpage :
256
Abstract :
Wireless mesh networks (WMNs) are growing in popularity because of their inherent robustness, versatility, and ease of deployment in situations such as natural or man-made disasters. Another area of potential use for these networks is in physical security systems where they can potentially improve mobile communications, communications with remote locations, temporary communications, and geolocation applications. Since these physical security systems may employ a mobile WMN to transport sensitive or classified information, questions arise as to whether end-to-end encryption would work within a very dynamic WMN. We could not find published data or results concerning this. Therefore, we set out to find whether end-to-end encryption will continue to work through an ever-changing WMN. We examined the behavior of end-to-end encryption when the path through the wireless network changes (that is, when routing is forced through a different intermediate node or nodes) and when traversing a radio frequency (RF) shadow. We especially wished to determine whether a tunnel, as used in software virtual private networks (VPNs) or hardware encryption devices, would survive RF shadow transits and mesh network topology changes. This paper presents an introduction to WMNs, their applicability to physical security systems, our end-to-end encryption experiments, analysis of the results, and our conclusions.
Keywords :
cryptography; mobile communication; telecommunication network routing; telecommunication network topology; telecommunication security; virtual private networks; wireless mesh networks; classified information; end-to-end encryption; geolocation applications; hardware encryption devices; intermediate node; mesh network topology; mobile communications; mobile wireless mesh networks; physical security systems; radio frequency shadow; remote location communications; routing; software virtual private networks; temporary communications; transport sensitive; Encryption; Radio frequency; Software; Throughput; Virtual private networks; Wireless communication; Wireless mesh networks; encryption; mesh networks; mobile; wireless;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security Technology (ICCST), 2012 IEEE International Carnahan Conference on
Conference_Location :
Boston, MA
ISSN :
1071-6572
Print_ISBN :
978-1-4673-2450-2
Electronic_ISBN :
1071-6572
Type :
conf
DOI :
10.1109/CCST.2012.6393567
Filename :
6393567
Link To Document :
بازگشت