The Community for Technology Leaders
RSS Icon
Subscribe
Clearwater Beach, FL, USA USA
Oct. 22, 2012 to Oct. 25, 2012
ISBN: 978-1-4673-1565-4
pp: 102-110
Nils Aschenbruck , University of Osnabrück - Institute of Computer Science, Albrechtstr. 28, 49076, Germany
Elmar Gerhards-Padilla , University of Bonn - Institute of Computer Science 4, Friedrich-Ebert-Allee 144, 53113, Germany
Martin Lambertz , University of Bonn - Institute of Computer Science 4, Friedrich-Ebert-Allee 144, 53113, Germany
ABSTRACT
Security is one of the core challenges especially for wireless multi-hop networks in public safety scenarios. Sensitive data is transmitted via insecure links. Furthermore, there may be competing interests. Thus, there is a high probability of disturbance or eavesdropping of communication. Confidentiality, integrity, and authenticity of transmitted packets can be provided by cryptographic means. However, as the devices used in multi-hop networks are usually resource constrained, the goal of this paper is to scrutinize the feasibility of securing such networks using strong but computationally expensive cryptography. In this paper, we show generic benchmarking results for tactical multi-hop network devices as well as a case study comparing two routing security approaches.
INDEX TERMS
Cryptography, Benchmark testing, Routing, Performance evaluation, Spread spectrum communication, Linux, Tactical Wireless Multi-hop Networks, Cryptography, Security Approaches
CITATION
Nils Aschenbruck, Elmar Gerhards-Padilla, Martin Lambertz, "Applicability of crypto-based security approaches in tactical wireless multi-hop networks", LCN, 2012, 38th Annual IEEE Conference on Local Computer Networks, 38th Annual IEEE Conference on Local Computer Networks 2012, pp. 102-110, doi:10.1109/LCN.2012.6423584
22 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool