Securing multi-operator-based QoS-aware mesh networks: requirements and design options
Wireless mesh networking allows network operators and service providers to offer nearly ubiquitous broadband access at a low cost to customers. In this paper, we focus on QoS‐aware mesh networks operated by multiple operators in a cooperative manner. In particular, we identify the general security r...
Gespeichert in:
Veröffentlicht in: | Wireless communications and mobile computing 2010-05, Vol.10 (5), p.622-646 |
---|---|
Hauptverfasser: | , , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 646 |
---|---|
container_issue | 5 |
container_start_page | 622 |
container_title | Wireless communications and mobile computing |
container_volume | 10 |
creator | Askoxylakis, I. Bencsáth, B. Buttyán, L. Dóra, L. Siris, V. Szili, D. Vajda, I. |
description | Wireless mesh networking allows network operators and service providers to offer nearly ubiquitous broadband access at a low cost to customers. In this paper, we focus on QoS‐aware mesh networks operated by multiple operators in a cooperative manner. In particular, we identify the general security requirements of such networks and we give an overview on the available design options for a security architecture aiming at satisfying those requirements. More specifically, we consider the problems of mesh client authentication and access control, protection of wireless communications, securing the routing, key management, and intrusion and misbehavior detection and recovery. Our aim is to structure this rich problem domain and to prepare the grounds for the design of a practically usable security architecture. Copyright © 2008 John Wiley & Sons, Ltd. |
doi_str_mv | 10.1002/wcm.728 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_901671657</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>901671657</sourcerecordid><originalsourceid>FETCH-LOGICAL-c3318-e5e4ef5c803b0936c1d1dad1b958a2830504395581a73c942ce95b13a6eda1223</originalsourceid><addsrcrecordid>eNp10L1OwzAUhmELgUQpiFvIxoBS7DiOHTZUQUFq-VELHS3HOS2mSZzaiULvnqIgmJjOGR59w4vQOcEjgnF01elyxCNxgAaEURyKhPPD3z9Jj9GJ9x8YY4ojMkBvc9CtM9U6KNuiMaGtwanGujBTHvLgxc5D1SkHQQn-Paig6azb-OvAwbY1DkqoGh-oKg9y8GZdBbZujK38KTpaqcLD2c8dote728X4Ppw-TR7GN9NQU0pECAxiWDEtMM1wShNNcpKrnGQpEyoSFDMc05QxQRSnOo0jDSnLCFUJ5IpEER2ii363dnbbgm9kabyGolAV2NbLFJOEk4TxP6md9d7BStbOlMrtJMHyO5zch5P7cHt52cvOFLD7j8nleNbrsNfGN_D5q5XbyIRTzuTycSKXMy6S53ghJ_QL01V-Gw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>901671657</pqid></control><display><type>article</type><title>Securing multi-operator-based QoS-aware mesh networks: requirements and design options</title><source>Alma/SFX Local Collection</source><creator>Askoxylakis, I. ; Bencsáth, B. ; Buttyán, L. ; Dóra, L. ; Siris, V. ; Szili, D. ; Vajda, I.</creator><creatorcontrib>Askoxylakis, I. ; Bencsáth, B. ; Buttyán, L. ; Dóra, L. ; Siris, V. ; Szili, D. ; Vajda, I.</creatorcontrib><description>Wireless mesh networking allows network operators and service providers to offer nearly ubiquitous broadband access at a low cost to customers. In this paper, we focus on QoS‐aware mesh networks operated by multiple operators in a cooperative manner. In particular, we identify the general security requirements of such networks and we give an overview on the available design options for a security architecture aiming at satisfying those requirements. More specifically, we consider the problems of mesh client authentication and access control, protection of wireless communications, securing the routing, key management, and intrusion and misbehavior detection and recovery. Our aim is to structure this rich problem domain and to prepare the grounds for the design of a practically usable security architecture. Copyright © 2008 John Wiley & Sons, Ltd.</description><identifier>ISSN: 1530-8669</identifier><identifier>ISSN: 1530-8677</identifier><identifier>EISSN: 1530-8677</identifier><identifier>DOI: 10.1002/wcm.728</identifier><language>eng</language><publisher>Chichester, UK: John Wiley & Sons, Ltd</publisher><subject>Architecture ; authentication ; Customers ; Grounds ; Intrusion ; intrusion detection and recovery ; key management ; Networks ; Operators ; secure communications ; secure routing ; Security ; Wireless communication ; wireless mesh networks</subject><ispartof>Wireless communications and mobile computing, 2010-05, Vol.10 (5), p.622-646</ispartof><rights>Copyright © 2008 John Wiley & Sons, Ltd.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c3318-e5e4ef5c803b0936c1d1dad1b958a2830504395581a73c942ce95b13a6eda1223</citedby><cites>FETCH-LOGICAL-c3318-e5e4ef5c803b0936c1d1dad1b958a2830504395581a73c942ce95b13a6eda1223</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,777,781,27905,27906</link.rule.ids></links><search><creatorcontrib>Askoxylakis, I.</creatorcontrib><creatorcontrib>Bencsáth, B.</creatorcontrib><creatorcontrib>Buttyán, L.</creatorcontrib><creatorcontrib>Dóra, L.</creatorcontrib><creatorcontrib>Siris, V.</creatorcontrib><creatorcontrib>Szili, D.</creatorcontrib><creatorcontrib>Vajda, I.</creatorcontrib><title>Securing multi-operator-based QoS-aware mesh networks: requirements and design options</title><title>Wireless communications and mobile computing</title><addtitle>Wirel. Commun. Mob. Comput</addtitle><description>Wireless mesh networking allows network operators and service providers to offer nearly ubiquitous broadband access at a low cost to customers. In this paper, we focus on QoS‐aware mesh networks operated by multiple operators in a cooperative manner. In particular, we identify the general security requirements of such networks and we give an overview on the available design options for a security architecture aiming at satisfying those requirements. More specifically, we consider the problems of mesh client authentication and access control, protection of wireless communications, securing the routing, key management, and intrusion and misbehavior detection and recovery. Our aim is to structure this rich problem domain and to prepare the grounds for the design of a practically usable security architecture. Copyright © 2008 John Wiley & Sons, Ltd.</description><subject>Architecture</subject><subject>authentication</subject><subject>Customers</subject><subject>Grounds</subject><subject>Intrusion</subject><subject>intrusion detection and recovery</subject><subject>key management</subject><subject>Networks</subject><subject>Operators</subject><subject>secure communications</subject><subject>secure routing</subject><subject>Security</subject><subject>Wireless communication</subject><subject>wireless mesh networks</subject><issn>1530-8669</issn><issn>1530-8677</issn><issn>1530-8677</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2010</creationdate><recordtype>article</recordtype><recordid>eNp10L1OwzAUhmELgUQpiFvIxoBS7DiOHTZUQUFq-VELHS3HOS2mSZzaiULvnqIgmJjOGR59w4vQOcEjgnF01elyxCNxgAaEURyKhPPD3z9Jj9GJ9x8YY4ojMkBvc9CtM9U6KNuiMaGtwanGujBTHvLgxc5D1SkHQQn-Paig6azb-OvAwbY1DkqoGh-oKg9y8GZdBbZujK38KTpaqcLD2c8dote728X4Ppw-TR7GN9NQU0pECAxiWDEtMM1wShNNcpKrnGQpEyoSFDMc05QxQRSnOo0jDSnLCFUJ5IpEER2ii363dnbbgm9kabyGolAV2NbLFJOEk4TxP6md9d7BStbOlMrtJMHyO5zch5P7cHt52cvOFLD7j8nleNbrsNfGN_D5q5XbyIRTzuTycSKXMy6S53ghJ_QL01V-Gw</recordid><startdate>201005</startdate><enddate>201005</enddate><creator>Askoxylakis, I.</creator><creator>Bencsáth, B.</creator><creator>Buttyán, L.</creator><creator>Dóra, L.</creator><creator>Siris, V.</creator><creator>Szili, D.</creator><creator>Vajda, I.</creator><general>John Wiley & Sons, Ltd</general><scope>BSCLL</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>201005</creationdate><title>Securing multi-operator-based QoS-aware mesh networks: requirements and design options</title><author>Askoxylakis, I. ; Bencsáth, B. ; Buttyán, L. ; Dóra, L. ; Siris, V. ; Szili, D. ; Vajda, I.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c3318-e5e4ef5c803b0936c1d1dad1b958a2830504395581a73c942ce95b13a6eda1223</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Architecture</topic><topic>authentication</topic><topic>Customers</topic><topic>Grounds</topic><topic>Intrusion</topic><topic>intrusion detection and recovery</topic><topic>key management</topic><topic>Networks</topic><topic>Operators</topic><topic>secure communications</topic><topic>secure routing</topic><topic>Security</topic><topic>Wireless communication</topic><topic>wireless mesh networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Askoxylakis, I.</creatorcontrib><creatorcontrib>Bencsáth, B.</creatorcontrib><creatorcontrib>Buttyán, L.</creatorcontrib><creatorcontrib>Dóra, L.</creatorcontrib><creatorcontrib>Siris, V.</creatorcontrib><creatorcontrib>Szili, D.</creatorcontrib><creatorcontrib>Vajda, I.</creatorcontrib><collection>Istex</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Wireless communications and mobile computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Askoxylakis, I.</au><au>Bencsáth, B.</au><au>Buttyán, L.</au><au>Dóra, L.</au><au>Siris, V.</au><au>Szili, D.</au><au>Vajda, I.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Securing multi-operator-based QoS-aware mesh networks: requirements and design options</atitle><jtitle>Wireless communications and mobile computing</jtitle><addtitle>Wirel. Commun. Mob. Comput</addtitle><date>2010-05</date><risdate>2010</risdate><volume>10</volume><issue>5</issue><spage>622</spage><epage>646</epage><pages>622-646</pages><issn>1530-8669</issn><issn>1530-8677</issn><eissn>1530-8677</eissn><abstract>Wireless mesh networking allows network operators and service providers to offer nearly ubiquitous broadband access at a low cost to customers. In this paper, we focus on QoS‐aware mesh networks operated by multiple operators in a cooperative manner. In particular, we identify the general security requirements of such networks and we give an overview on the available design options for a security architecture aiming at satisfying those requirements. More specifically, we consider the problems of mesh client authentication and access control, protection of wireless communications, securing the routing, key management, and intrusion and misbehavior detection and recovery. Our aim is to structure this rich problem domain and to prepare the grounds for the design of a practically usable security architecture. Copyright © 2008 John Wiley & Sons, Ltd.</abstract><cop>Chichester, UK</cop><pub>John Wiley & Sons, Ltd</pub><doi>10.1002/wcm.728</doi><tpages>25</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1530-8669 |
ispartof | Wireless communications and mobile computing, 2010-05, Vol.10 (5), p.622-646 |
issn | 1530-8669 1530-8677 1530-8677 |
language | eng |
recordid | cdi_proquest_miscellaneous_901671657 |
source | Alma/SFX Local Collection |
subjects | Architecture authentication Customers Grounds Intrusion intrusion detection and recovery key management Networks Operators secure communications secure routing Security Wireless communication wireless mesh networks |
title | Securing multi-operator-based QoS-aware mesh networks: requirements and design options |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-17T18%3A05%3A06IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Securing%20multi-operator-based%20QoS-aware%20mesh%20networks:%20requirements%20and%20design%20options&rft.jtitle=Wireless%20communications%20and%20mobile%20computing&rft.au=Askoxylakis,%20I.&rft.date=2010-05&rft.volume=10&rft.issue=5&rft.spage=622&rft.epage=646&rft.pages=622-646&rft.issn=1530-8669&rft.eissn=1530-8677&rft_id=info:doi/10.1002/wcm.728&rft_dat=%3Cproquest_cross%3E901671657%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=901671657&rft_id=info:pmid/&rfr_iscdi=true |