Difference between revisions of "Pubs:2010"

From Pel
Jump to navigation Jump to search
 
(3 intermediate revisions by 2 users not shown)
Line 1: Line 1:
<bibtex>@article { 484,
+
<bibtex>
title = {Security Analysis of Wireless Mesh Backhauls for Mobile Networks},
+
@article{484,
journal = {Journal of Network and Computer Applications},
+
author={Frank A. Zdarksy, Sebastian Robitzsch, Albert Banchs},
volume = {In Press},
+
title={Security Analysis of Wireless Mesh Backhauls for Mobile Networks},
year = {2010},
+
journal={Journal of Network and Computer Applications},
month = {04/2010},
+
year={2010},
pages = {--},
+
pages={--},
publisher = {Elsevier},
+
volume={In Press},
abstract = {This article extends prior security threat analyses of 3rd generation mobile network architectures for the case of wireless mesh backhauls. It presents a description of the security model for the considered architecture and provides a list of the basic assumptions, security objectives, assets to be protected and actors of the analysis. On this foundation, potential security threats are analyzed and discussed and then assessed for their corresponding risk. The result of this risk assessment is then used to define a set of security requirements. Finally, we give some recommendations for wireless mesh backhaul designs and implementations following these requirements.},
+
abstract={Radio links are used to provide backhaul connectivity for base stations of mobile networks, in cases in which cable-based alternatives are not available and cannot be deployed in an economic or timely manner. While such wireless backhauls have been predominantly used in redundant tree and ring topologies in the past, mobile network operators have become increasingly interested in meshed topologies for carrier-grade wireless backhauls. However, wireless mesh backhauls are potentially more susceptible to security vulnerabilities, given that radio links are more exposed to tampering and given their higher system complexity.
keywords = {Security analysis, Wireless mesh backhauls, Mobile networks},
+
author = {Frank A. Zdarksy, Sebastian Robitzsch, Albert Banchs}
+
This article extends prior security threat analyses of 3rd generation mobile network architectures for the case of wireless mesh backhauls. It presents a description of the security model for the considered architecture and provides a list of the basic assumptions, security objectives, assets to be protected and actors of the analysis. On this foundation, potential security threats are analyzed and discussed and then assessed for their corresponding risk. The result of this risk assessment is then used to define a set of security requirements. Finally, we give some recommendations for wireless mesh backhaul designs and implementations following these requirements.},
 +
keywords={Security analysis, Wireless mesh backhauls, Mobile networks},
 +
pdf={2010 - Zdarsky, Robitzsch, Banchs.pdf},
 +
}
 +
</bibtex>
 +
<bibtex>
 +
@misc{Robitzsch2010a,
 +
address = {Athens},
 +
author = {Robitzsch, Sebastian and Fitzpatrick, John and Murphy, Se\'{a}n and Murphy, Liam},
 +
booktitle = {European Coorperation in the Field of Scientific and Technical Research, COST 2100},
 +
publisher = {European Coorperation in the Field of Scientific and Technical Research, COST 2100},
 +
title = {An Experimental Evaluation of Co-Channel Interference in IEEE802.11a Multi-Radio Mesh Nodes},
 +
year = {2010},
 +
pdf = {2010 - Robitzsch et al. - Behind-the-Scenes of IEEE 802.11a Based Multi-Radio Mesh Networks A Measurement Driven Evaluation of Inter-Channel Interference.pdf}
 
}
 
}
 
 
</bibtex>
 
</bibtex>

Latest revision as of 15:32, 11 July 2012

<bibtex> @article{484, author={Frank A. Zdarksy, Sebastian Robitzsch, Albert Banchs}, title={Security Analysis of Wireless Mesh Backhauls for Mobile Networks}, journal={Journal of Network and Computer Applications}, year={2010}, pages={--}, volume={In Press}, abstract={Radio links are used to provide backhaul connectivity for base stations of mobile networks, in cases in which cable-based alternatives are not available and cannot be deployed in an economic or timely manner. While such wireless backhauls have been predominantly used in redundant tree and ring topologies in the past, mobile network operators have become increasingly interested in meshed topologies for carrier-grade wireless backhauls. However, wireless mesh backhauls are potentially more susceptible to security vulnerabilities, given that radio links are more exposed to tampering and given their higher system complexity.

This article extends prior security threat analyses of 3rd generation mobile network architectures for the case of wireless mesh backhauls. It presents a description of the security model for the considered architecture and provides a list of the basic assumptions, security objectives, assets to be protected and actors of the analysis. On this foundation, potential security threats are analyzed and discussed and then assessed for their corresponding risk. The result of this risk assessment is then used to define a set of security requirements. Finally, we give some recommendations for wireless mesh backhaul designs and implementations following these requirements.}, keywords={Security analysis, Wireless mesh backhauls, Mobile networks}, pdf={2010 - Zdarsky, Robitzsch, Banchs.pdf}, } </bibtex> <bibtex> @misc{Robitzsch2010a, address = {Athens}, author = {Robitzsch, Sebastian and Fitzpatrick, John and Murphy, Se\'{a}n and Murphy, Liam}, booktitle = {European Coorperation in the Field of Scientific and Technical Research, COST 2100}, publisher = {European Coorperation in the Field of Scientific and Technical Research, COST 2100}, title = {An Experimental Evaluation of Co-Channel Interference in IEEE802.11a Multi-Radio Mesh Nodes}, year = {2010}, pdf = {2010 - Robitzsch et al. - Behind-the-Scenes of IEEE 802.11a Based Multi-Radio Mesh Networks A Measurement Driven Evaluation of Inter-Channel Interference.pdf} } </bibtex>