This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
37th Annual IEEE Conference on Local Computer Networks
Applicability of crypto-based security approaches in tactical wireless multi-hop networks
Clearwater Beach, FL, USA USA
October 22-October 25
ISBN: 978-1-4673-1565-4
Nils Aschenbruck, University of Osnabrück - Institute of Computer Science, Albrechtstr. 28, 49076, Germany
Elmar Gerhards-Padilla, University of Bonn - Institute of Computer Science 4, Friedrich-Ebert-Allee 144, 53113, Germany
Martin Lambertz, University of Bonn - Institute of Computer Science 4, Friedrich-Ebert-Allee 144, 53113, Germany
Security is one of the core challenges especially for wireless multi-hop networks in public safety scenarios. Sensitive data is transmitted via insecure links. Furthermore, there may be competing interests. Thus, there is a high probability of disturbance or eavesdropping of communication. Confidentiality, integrity, and authenticity of transmitted packets can be provided by cryptographic means. However, as the devices used in multi-hop networks are usually resource constrained, the goal of this paper is to scrutinize the feasibility of securing such networks using strong but computationally expensive cryptography. In this paper, we show generic benchmarking results for tactical multi-hop network devices as well as a case study comparing two routing security approaches.
Index Terms:
Cryptography,Benchmark testing,Routing,Performance evaluation,Spread spectrum communication,Linux,Tactical Wireless Multi-hop Networks,Cryptography,Security Approaches
Citation:
Nils Aschenbruck, Elmar Gerhards-Padilla, Martin Lambertz, "Applicability of crypto-based security approaches in tactical wireless multi-hop networks," lcn, pp.102-110, 37th Annual IEEE Conference on Local Computer Networks, 2012
Usage of this product signifies your acceptance of the Terms of Use.