Behavioral Modeling for Public Safety Communication in Wireless Mesh Networking

Accompanying dramatic advances in wireless Mesh networking, the demand for advanced mechanisms to employ wireless Mesh networks in public safety continues to grow. However, this special field communication brings new security challenges. In this paper, we import the expectancy-value theory in cognitive psychology to behavioral evaluation of node and propose a behavioral model named NODE EYE for public safety communication in wireless Mesh networks and exercise the model to reason a variation of station-to-station key agreement protocol. We contend that our model facilitates reasoning about protocols designed for public safety by integrating the behavioral trust and cryptographic aspects of communication in the special field. We illustrate our concept by introducing the key agreement to support the special communication cases associated with the public safety.

[1]  Paul C. van Oorschot,et al.  Authentication and authenticated key exchanges , 1992, Des. Codes Cryptogr..

[2]  K. Ravindran Programming Models for Behavioral Monitoring of Distributed Networks , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[3]  Helmut Knebl,et al.  Introduction to Cryptography , 2002, Information Security and Cryptography.

[4]  Baris Fidan,et al.  Coordination and Control of Multi-agent Dynamic Systems: Models and Approaches , 2006, Swarm Robotics.

[5]  Georgina Stegmayer,et al.  Volterra NN-based behavioral model for new wireless communications devices , 2009, Neural Computing and Applications.

[6]  D. Dragomirescu,et al.  VHDL-AMS behavioral models for the simulation of wireless sensors networks , 2009, 2009 6th International Multi-Conference on Systems, Signals and Devices.

[7]  S.M. Fakhraie,et al.  Behavioral Fault Model for Neural Networks , 2009, 2009 International Conference on Computer Engineering and Technology.

[8]  Alfred Menezes,et al.  Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol , 1999, Public Key Cryptography.

[9]  John R. Anderson Cognitive Psychology and Its Implications , 1980 .

[10]  Chae Hoon Lim,et al.  Directed Signatures and Application to Threshold Cryptosystems , 1996, Security Protocols Workshop.

[11]  Chae Hoon Lim,et al.  Modified Maurer-Yacobi's scheme and its applications , 1992, AUSCRYPT.

[12]  James A. Davis,et al.  Modeling Protocols for Secure Group Communications in Ad Hoc Networks: (Extended Abstract) , 2002, Security Protocols Workshop.

[13]  I. Ajzen,et al.  Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .

[14]  Ulf Körner,et al.  Urban mesh and ad hoc mesh networks , 2008, Int. J. Netw. Manag..

[15]  H. T. Mouftah,et al.  Wireless mesh networking , 2005, MSWiM '05.

[16]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[17]  Zhiping Yu,et al.  Behavioral Model of Wide Band Sigma-Delta Modulators for WLAN Application , 2009, 2009 International Conference on New Trends in Information and Service Science.