• DocumentCode
    3780175
  • Title

    Optimizing cryptographically based security in wireless networks

  • Author

    Stuart Jacobs

  • Author_Institution
    Computer Science Department, Metropolitan College, Boston University, 808 Commonwealth Ave., Boston, MA, U.S.A.
  • fYear
    2015
  • Firstpage
    39
  • Lastpage
    45
  • Abstract
    Within wireless networks, an unauthorized or malicious wireless device can receive broadcasted messages or broadcast its own messages at any time provided it is within signal range of other wireless network nodes. Wireless networks have a higher rate of bit errors (BER) when compared to wired networks. The frequency of attacks on networks has grown in parallel with development of wireless networking. Many attacks against network traffic can be defeated by the use of cryptographic mechanisms. Given how wired network links experience statistically low BER, the likelihood of a message being rejected by cryptographic protection mechanism use, due to bit errors, is also low. Wireless networks have a significantly higher BER that will result in higher message rejection rates when cryptographic protection mechanisms are used. When messages are rejected, retransmission will be required thereby increasing bandwidth utilization of wireless links. Since wireless networks use many protocols secured via cryptographic functions, the ability to reduce message rejection rates due to bit errors will positively affect wireless link utilization rates. Research is needed that focuses on determining how to optimize the use of cryptographic security mechanisms in high BER environments while minimizing network device and transmission link resources.
  • Keywords
    "Cryptography","Wireless sensor networks","Wireless networks","Ad hoc networks","Authentication","Bit error rate"
  • Publisher
    ieee
  • Conference_Titel
    Information Systems Security and Privacy (ICISSP), 2015 International Conference on
  • Type

    conf

  • Filename
    7509928