Securing multi-operator-based QoS-aware mesh networks: requirements and design options

Wireless mesh networking allows network operators and service providers to offer nearly ubiquitous broadband access at a low cost to customers. In this paper, we focus on QoS‐aware mesh networks operated by multiple operators in a cooperative manner. In particular, we identify the general security r...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Wireless communications and mobile computing 2010-05, Vol.10 (5), p.622-646
Hauptverfasser: Askoxylakis, I., Bencsáth, B., Buttyán, L., Dóra, L., Siris, V., Szili, D., Vajda, I.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 646
container_issue 5
container_start_page 622
container_title Wireless communications and mobile computing
container_volume 10
creator Askoxylakis, I.
Bencsáth, B.
Buttyán, L.
Dóra, L.
Siris, V.
Szili, D.
Vajda, I.
description Wireless mesh networking allows network operators and service providers to offer nearly ubiquitous broadband access at a low cost to customers. In this paper, we focus on QoS‐aware mesh networks operated by multiple operators in a cooperative manner. In particular, we identify the general security requirements of such networks and we give an overview on the available design options for a security architecture aiming at satisfying those requirements. More specifically, we consider the problems of mesh client authentication and access control, protection of wireless communications, securing the routing, key management, and intrusion and misbehavior detection and recovery. Our aim is to structure this rich problem domain and to prepare the grounds for the design of a practically usable security architecture. Copyright © 2008 John Wiley & Sons, Ltd.
doi_str_mv 10.1002/wcm.728
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_901671657</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>901671657</sourcerecordid><originalsourceid>FETCH-LOGICAL-c3318-e5e4ef5c803b0936c1d1dad1b958a2830504395581a73c942ce95b13a6eda1223</originalsourceid><addsrcrecordid>eNp10L1OwzAUhmELgUQpiFvIxoBS7DiOHTZUQUFq-VELHS3HOS2mSZzaiULvnqIgmJjOGR59w4vQOcEjgnF01elyxCNxgAaEURyKhPPD3z9Jj9GJ9x8YY4ojMkBvc9CtM9U6KNuiMaGtwanGujBTHvLgxc5D1SkHQQn-Paig6azb-OvAwbY1DkqoGh-oKg9y8GZdBbZujK38KTpaqcLD2c8dote728X4Ppw-TR7GN9NQU0pECAxiWDEtMM1wShNNcpKrnGQpEyoSFDMc05QxQRSnOo0jDSnLCFUJ5IpEER2ii363dnbbgm9kabyGolAV2NbLFJOEk4TxP6md9d7BStbOlMrtJMHyO5zch5P7cHt52cvOFLD7j8nleNbrsNfGN_D5q5XbyIRTzuTycSKXMy6S53ghJ_QL01V-Gw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>901671657</pqid></control><display><type>article</type><title>Securing multi-operator-based QoS-aware mesh networks: requirements and design options</title><source>Alma/SFX Local Collection</source><creator>Askoxylakis, I. ; Bencsáth, B. ; Buttyán, L. ; Dóra, L. ; Siris, V. ; Szili, D. ; Vajda, I.</creator><creatorcontrib>Askoxylakis, I. ; Bencsáth, B. ; Buttyán, L. ; Dóra, L. ; Siris, V. ; Szili, D. ; Vajda, I.</creatorcontrib><description>Wireless mesh networking allows network operators and service providers to offer nearly ubiquitous broadband access at a low cost to customers. In this paper, we focus on QoS‐aware mesh networks operated by multiple operators in a cooperative manner. In particular, we identify the general security requirements of such networks and we give an overview on the available design options for a security architecture aiming at satisfying those requirements. More specifically, we consider the problems of mesh client authentication and access control, protection of wireless communications, securing the routing, key management, and intrusion and misbehavior detection and recovery. Our aim is to structure this rich problem domain and to prepare the grounds for the design of a practically usable security architecture. Copyright © 2008 John Wiley &amp; Sons, Ltd.</description><identifier>ISSN: 1530-8669</identifier><identifier>ISSN: 1530-8677</identifier><identifier>EISSN: 1530-8677</identifier><identifier>DOI: 10.1002/wcm.728</identifier><language>eng</language><publisher>Chichester, UK: John Wiley &amp; Sons, Ltd</publisher><subject>Architecture ; authentication ; Customers ; Grounds ; Intrusion ; intrusion detection and recovery ; key management ; Networks ; Operators ; secure communications ; secure routing ; Security ; Wireless communication ; wireless mesh networks</subject><ispartof>Wireless communications and mobile computing, 2010-05, Vol.10 (5), p.622-646</ispartof><rights>Copyright © 2008 John Wiley &amp; Sons, Ltd.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c3318-e5e4ef5c803b0936c1d1dad1b958a2830504395581a73c942ce95b13a6eda1223</citedby><cites>FETCH-LOGICAL-c3318-e5e4ef5c803b0936c1d1dad1b958a2830504395581a73c942ce95b13a6eda1223</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,777,781,27905,27906</link.rule.ids></links><search><creatorcontrib>Askoxylakis, I.</creatorcontrib><creatorcontrib>Bencsáth, B.</creatorcontrib><creatorcontrib>Buttyán, L.</creatorcontrib><creatorcontrib>Dóra, L.</creatorcontrib><creatorcontrib>Siris, V.</creatorcontrib><creatorcontrib>Szili, D.</creatorcontrib><creatorcontrib>Vajda, I.</creatorcontrib><title>Securing multi-operator-based QoS-aware mesh networks: requirements and design options</title><title>Wireless communications and mobile computing</title><addtitle>Wirel. Commun. Mob. Comput</addtitle><description>Wireless mesh networking allows network operators and service providers to offer nearly ubiquitous broadband access at a low cost to customers. In this paper, we focus on QoS‐aware mesh networks operated by multiple operators in a cooperative manner. In particular, we identify the general security requirements of such networks and we give an overview on the available design options for a security architecture aiming at satisfying those requirements. More specifically, we consider the problems of mesh client authentication and access control, protection of wireless communications, securing the routing, key management, and intrusion and misbehavior detection and recovery. Our aim is to structure this rich problem domain and to prepare the grounds for the design of a practically usable security architecture. Copyright © 2008 John Wiley &amp; Sons, Ltd.</description><subject>Architecture</subject><subject>authentication</subject><subject>Customers</subject><subject>Grounds</subject><subject>Intrusion</subject><subject>intrusion detection and recovery</subject><subject>key management</subject><subject>Networks</subject><subject>Operators</subject><subject>secure communications</subject><subject>secure routing</subject><subject>Security</subject><subject>Wireless communication</subject><subject>wireless mesh networks</subject><issn>1530-8669</issn><issn>1530-8677</issn><issn>1530-8677</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2010</creationdate><recordtype>article</recordtype><recordid>eNp10L1OwzAUhmELgUQpiFvIxoBS7DiOHTZUQUFq-VELHS3HOS2mSZzaiULvnqIgmJjOGR59w4vQOcEjgnF01elyxCNxgAaEURyKhPPD3z9Jj9GJ9x8YY4ojMkBvc9CtM9U6KNuiMaGtwanGujBTHvLgxc5D1SkHQQn-Paig6azb-OvAwbY1DkqoGh-oKg9y8GZdBbZujK38KTpaqcLD2c8dote728X4Ppw-TR7GN9NQU0pECAxiWDEtMM1wShNNcpKrnGQpEyoSFDMc05QxQRSnOo0jDSnLCFUJ5IpEER2ii363dnbbgm9kabyGolAV2NbLFJOEk4TxP6md9d7BStbOlMrtJMHyO5zch5P7cHt52cvOFLD7j8nleNbrsNfGN_D5q5XbyIRTzuTycSKXMy6S53ghJ_QL01V-Gw</recordid><startdate>201005</startdate><enddate>201005</enddate><creator>Askoxylakis, I.</creator><creator>Bencsáth, B.</creator><creator>Buttyán, L.</creator><creator>Dóra, L.</creator><creator>Siris, V.</creator><creator>Szili, D.</creator><creator>Vajda, I.</creator><general>John Wiley &amp; Sons, Ltd</general><scope>BSCLL</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>201005</creationdate><title>Securing multi-operator-based QoS-aware mesh networks: requirements and design options</title><author>Askoxylakis, I. ; Bencsáth, B. ; Buttyán, L. ; Dóra, L. ; Siris, V. ; Szili, D. ; Vajda, I.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c3318-e5e4ef5c803b0936c1d1dad1b958a2830504395581a73c942ce95b13a6eda1223</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Architecture</topic><topic>authentication</topic><topic>Customers</topic><topic>Grounds</topic><topic>Intrusion</topic><topic>intrusion detection and recovery</topic><topic>key management</topic><topic>Networks</topic><topic>Operators</topic><topic>secure communications</topic><topic>secure routing</topic><topic>Security</topic><topic>Wireless communication</topic><topic>wireless mesh networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Askoxylakis, I.</creatorcontrib><creatorcontrib>Bencsáth, B.</creatorcontrib><creatorcontrib>Buttyán, L.</creatorcontrib><creatorcontrib>Dóra, L.</creatorcontrib><creatorcontrib>Siris, V.</creatorcontrib><creatorcontrib>Szili, D.</creatorcontrib><creatorcontrib>Vajda, I.</creatorcontrib><collection>Istex</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Wireless communications and mobile computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Askoxylakis, I.</au><au>Bencsáth, B.</au><au>Buttyán, L.</au><au>Dóra, L.</au><au>Siris, V.</au><au>Szili, D.</au><au>Vajda, I.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Securing multi-operator-based QoS-aware mesh networks: requirements and design options</atitle><jtitle>Wireless communications and mobile computing</jtitle><addtitle>Wirel. Commun. Mob. Comput</addtitle><date>2010-05</date><risdate>2010</risdate><volume>10</volume><issue>5</issue><spage>622</spage><epage>646</epage><pages>622-646</pages><issn>1530-8669</issn><issn>1530-8677</issn><eissn>1530-8677</eissn><abstract>Wireless mesh networking allows network operators and service providers to offer nearly ubiquitous broadband access at a low cost to customers. In this paper, we focus on QoS‐aware mesh networks operated by multiple operators in a cooperative manner. In particular, we identify the general security requirements of such networks and we give an overview on the available design options for a security architecture aiming at satisfying those requirements. More specifically, we consider the problems of mesh client authentication and access control, protection of wireless communications, securing the routing, key management, and intrusion and misbehavior detection and recovery. Our aim is to structure this rich problem domain and to prepare the grounds for the design of a practically usable security architecture. Copyright © 2008 John Wiley &amp; Sons, Ltd.</abstract><cop>Chichester, UK</cop><pub>John Wiley &amp; Sons, Ltd</pub><doi>10.1002/wcm.728</doi><tpages>25</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1530-8669
ispartof Wireless communications and mobile computing, 2010-05, Vol.10 (5), p.622-646
issn 1530-8669
1530-8677
1530-8677
language eng
recordid cdi_proquest_miscellaneous_901671657
source Alma/SFX Local Collection
subjects Architecture
authentication
Customers
Grounds
Intrusion
intrusion detection and recovery
key management
Networks
Operators
secure communications
secure routing
Security
Wireless communication
wireless mesh networks
title Securing multi-operator-based QoS-aware mesh networks: requirements and design options
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-17T18%3A05%3A06IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Securing%20multi-operator-based%20QoS-aware%20mesh%20networks:%20requirements%20and%20design%20options&rft.jtitle=Wireless%20communications%20and%20mobile%20computing&rft.au=Askoxylakis,%20I.&rft.date=2010-05&rft.volume=10&rft.issue=5&rft.spage=622&rft.epage=646&rft.pages=622-646&rft.issn=1530-8669&rft.eissn=1530-8677&rft_id=info:doi/10.1002/wcm.728&rft_dat=%3Cproquest_cross%3E901671657%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=901671657&rft_id=info:pmid/&rfr_iscdi=true