Askoxylakis, I., Tryfonas, T., May, J., Siris, V. and Traganitis, A., 2011. A family of key agreement mechanisms for mission critical communications for secure mobile ad hoc and wireless mesh internetworking. Eurasip Journal on Wireless Communications and Networking, 2011, 807684.
Full text available as:
|
PDF
1687-1499-2011-807684.pdf - Published Version Available under License Creative Commons Attribution. 1MB | |
Copyright to original material in this document is with the original owner(s). Access to this content through BURO is granted on condition that you use it only for research, scholarly or other non-commercial purposes. If you wish to use it for any other purposes, you must contact BU via BURO@bournemouth.ac.uk. Any third party copyright material in this document remains the property of its respective owner(s). BU grants no licence for further use of that third party material. |
DOI: 10.1155/2011/807684
Abstract
Future wireless networks like mobile ad hoc networks and wireless mesh networks are expected to play important role in demanding communications such as mission critical communications. MANETs are ideal for emergency cases where the communication infrastructure has been completely destroyed and there is a need for quick set up of communications among the rescue/emergency workers. In such emergency scenarios wireless mesh networks may be employed in a later phase for providing advanced communications and services acting as a backbone network in the affected area. Internetworking of both types of future networks will provide a broad range of mission critical applications. While offering many advantages, such as flexibility, easy of deployment and low cost, MANETs and mesh networks face important security and resilience threats, especially for such demanding applications. We introduce a family of key agreement methods based on weak to strong authentication associated with several multiparty contributory key establishment methods. We examine the attributes of each key establishment method and how each method can be better applied in different scenarios. The proposed protocols support seamlessly both types of networks and consider system and application requirements such as efficient and secure internetworking, dynamicity of network topologies and support of thin clients. © 2011 Ioannis G. Askoxylakis et al.
Item Type: | Article |
---|---|
ISSN: | 1687-1472 |
Group: | Faculty of Science & Technology |
ID Code: | 24640 |
Deposited By: | Symplectic RT2 |
Deposited On: | 31 Aug 2016 11:18 |
Last Modified: | 14 Mar 2022 13:58 |
Downloads
Downloads per month over past year
Repository Staff Only - |