Security and Communication Networks

Cover image for Vol. 4 Issue 3

March 2011

Volume 4, Issue 3

Pages 239–346

  1. Guest Editorial

    1. Top of page
    2. Guest Editorial
    3. Special Issue Papers
    1. You have free access to this content
  2. Special Issue Papers

    1. Top of page
    2. Guest Editorial
    3. Special Issue Papers
    1. DSA-Mesh: a distributed security architecture for wireless mesh networks (pages 242–256)

      Fabio Martignon, Stefano Paris and Antonio Capone

      Version of Record online: 13 JAN 2010 | DOI: 10.1002/sec.181

      Thumbnail image of graphical abstract

      This paper proposes DSA-Mesh, a fully distributed security architecture that provides access control for mesh routers as well as a key distribution scheme that supports layer-2 encryption to ensure security and data confidentiality of all communications that occur in the backbone of a Wireless Mesh Network (WMN). A key feature in the design of DSA-Mesh is its independence from the underlying wireless technology used by network nodes to form the backbone. Furthermore, DSA-Mesh enables seamless mobility of mesh routers. Numerical results show that DSA-Mesh increases considerably the WMN security and reliability, with a negligible impact on the network performance, thus representing an effective solution for wireless mesh networking.

    2. Differentiated security in wireless mesh networks (pages 257–266)

      Thomas Gamer, Lars Völker and Martina Zitterbart

      Version of Record online: 14 DEC 2009 | DOI: 10.1002/sec.163

      Thumbnail image of graphical abstract

      Due to multi-hop communication and routing on layer 2 in mesh networks, attacks on the routing, selective forwarding, and eavesdropping on confidential data become relatively easy. To avoid such attacks, we introduce Differentiated Security which is based on protection levels associated with nodes in the network. Participation in the MAC layer routing is facilitated according to the respective protection level of a node. Using additional cryptographic protection our approach can also avoid unintentional disclosure of confidential data.

    3. Fast 802.11 handovers with 802.1X reauthentications (pages 267–283)

      Rodolphe Marques, Edgar Araújo and André Zúquete

      Version of Record online: 15 JAN 2010 | DOI: 10.1002/sec.184

      Thumbnail image of graphical abstract

      This paper presents a fast, generic 802.1x reauthentication protocol and its deployment using several 802.11 management frames, namely within network probing. This approach enables mobile nodes to install security associations on nearby APs while scanning for them. The main achievement is that handover latency can be reduced down to the latency of an 802.11 association with a very limited cooperation from the wireless network.

    4. Characterizing the greedy behavior in wireless ad hoc networks (pages 284–298)

      Soufiene Djahel, Farid Naït-abdesselam and Damla Turgut

      Version of Record online: 3 AUG 2010 | DOI: 10.1002/sec.210

      Thumbnail image of graphical abstract

      We have studied the greedy behavior problem in wireless ad hoc networks and proven that its impact is more devastating compared to that in WLAN. Moreover, an effective greedy strategy based on conflict graph has been devised, enabling a misbehaving node to gain extra bandwidth at the expense of its neighbors and keep its ongoing flows' performance reasonably high.

    5. MANET QoS support without reservations (pages 316–328)

      Soon Y. Oh, Gustavo Marfia and Mario Gerla

      Version of Record online: 21 JAN 2010 | DOI: 10.1002/sec.183

      Thumbnail image of graphical abstract

      We have proposed a novel scheme called ProbeCast which supports efficient call admission control and QoS in the MANET without requiring bandwidth estimation and reservations. ProbeCast uses probing and backpressure mechanisms to accept feasible flows and reject the unfeasible ones. We demonstrate the efficacy and robustness of Probecast for unicast as well as multicast scenarios via extensive simulation study.

    6. On the quality of broadcast services in vehicular ad hoc networks (pages 329–346)

      Dario Rossi, Roberta Fracchia and Michela Meo

      Version of Record online: 28 AUG 2010 | DOI: 10.1002/sec.211

      Thumbnail image of graphical abstract

      We investigate the broadcast problem in suburban and highway VANETs, providing a definitive comparison of beacon-based versus beaconless approaches. We explore a very large design space through a Convex Hull framework, that compactly presents the boundaries of the solution space for each algorithmic class. We find that the beaconless performance encompasses a wider spectrum than the beaconed one: this allows us to design beaconless algorithms that are more efficient than beaconed ones, with lower complexity and overhead.