A robust security scheme for wireless mesh enterprise networks

Md Abdul Hamid, M. Abdullah-Al-Wadud, Choong Seon Hong, Oksam Chae, Sungwon Lee

Research output: Contribution to journalArticlepeer-review

8 Citations (Scopus)

Abstract

In this paper, we address the security challenges for wireless mesh enterprise networks (WMENs). The topology and communication characteristics of WMEN include the following: (a) deployment of the network devices are not planar, rather, devices are deployed over three-dimensional space (e.g., office buildings, shopping malls, grocery stores, etc.); (b) messages, generated/received by a mesh client, traverse through mesh routers in a multihop fashion; and (c) mesh clients, being mostly mobile in nature, may result in misbehaving or be spurious during communications. We propose a security scheme for WMEN in order to ensure that only authorized users are granted network access. Particularly, our scheme includes: (a) a deterministic key distribution technique that perfectly suits the network topology, (b) an efficient session key establishment protocol to achieve the client-router and router-router communications security, and (c) a distributed detection mechanism to identify malicious clients in the network. Analytical and simulation results are presented to verify our proposed solutions.

Original languageEnglish
Pages (from-to)401-413
Number of pages13
JournalAnnales des Telecommunications/Annals of Telecommunications
Volume64
Issue number5-6
DOIs
Publication statusPublished - Jun 2009

Bibliographical note

Funding Information:
Acknowledgements This research was supported by the MKE under the ITRC support program supervised by the IITA (IITA-2008-(C1090-0801-0016)). Dr. Choong Seon Hong is the corresponding author.

Keywords

  • Communications security
  • Key distribution
  • Malicious client detection
  • Wireless mesh enterprise networks

Fingerprint

Dive into the research topics of 'A robust security scheme for wireless mesh enterprise networks'. Together they form a unique fingerprint.

Cite this