A link layer security protocol for Suburban Ad-Hoc Networks

Networks using wireless links are more vulnerable to various security threats than a wired network since wireless transmissions are prone to interception by anyone within the transmission range. Therefore participating entities should incorporate robust systems to withstand the attacks as rigorously as possible. In this paper we have presented a possible framework of a link level security protocol (LLSP) to be deployed in a Suburban Ad-hoc Network (SAHN [1][2][3][4][5][6]). LLSP provides authentication, integrity assurance and encryption for ensuring security at the data link layer. We have analysed various security aspects of LLSP to validate its effectiveness. To determine LLSP’s practicability, we have estimated the timing requirement for each authentication process. Our initial work indicate that LLSP can be a suitable link-level security service for an ad-hoc network similar to a SAHN.

[1]  Carlo Kopp,et al.  A hybrid QoS routing strategy for suburban ad-hoc networks , 2003, The 11th IEEE International Conference on Networks, 2003. ICON2003..

[2]  Soner Yesil,et al.  Two fast RSA implementations using high-radix montgomery algorithm , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).

[3]  Carlo Kopp,et al.  Efficient Routing in Suburban Ad-Hoc Networks (SAHN) , 2003, Communications in Computing.

[4]  Sunggu Lee,et al.  Design and implementation of a private and public key crypto processor and its application to a security system , 2004, IEEE Trans. Consumer Electron..

[5]  Arjen K. Lenstra,et al.  Selecting Cryptographic Key Sizes , 2000, Public Key Cryptography.

[6]  Carlo Kopp,et al.  A Router Architecture to Achieve Link Rate Throughput in Suburban Ad-hoc Networks , 2003, Asia-Pacific Computer Systems Architecture Conference.

[7]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[8]  Panagiotis Papadimitratos,et al.  Secure link state routing for mobile ad hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[9]  Jiejun Kong,et al.  Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[10]  Carlo Kopp,et al.  Multiple directional antennas in suburban ad-hoc networks , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[11]  Yvo Desmedt,et al.  Shared Generation of Authenticators and Signatures (Extended Abstract) , 1991, CRYPTO.

[12]  Akashi Satoh,et al.  A 10 Gbps full-AES crypto design with a twisted-BDD S-Box architecture , 2002, Proceedings. IEEE International Conference on Computer Design: VLSI in Computers and Processors.

[13]  Hung-Yun Hsieh,et al.  IEEE 802.11 over multi-hop wireless networks: problems and new perspectives , 2002, Proceedings IEEE 56th Vehicular Technology Conference.

[14]  Ronald Pose Password-capabilities: their evolution from the password-capability system into Walnut and beyond , 2001, Proceedings 6th Australasian Computer Systems Architecture Conference. ACSAC 2001.

[15]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[16]  Robin Kravets,et al.  Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.

[17]  Carlo Kopp,et al.  Bypassing the Home Computing Bottleneck: The Suburban Area Network , 1998 .

[18]  Robert S. Fabry,et al.  Capability-based addressing , 1974, CACM.

[19]  Dharma P. Agrawal,et al.  A novel authentication scheme for ad hoc networks , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).

[20]  Carlo Kopp,et al.  Routing in Suburban Ad-Hoc Networks , 2003 .

[21]  B. Brown 802.11: the security differences between b and i , 2003 .

[22]  Jim Binkley,et al.  Authenticated Ad Hoc Routing at the Link Layer for Mobile Systems , 2001, Wirel. Networks.

[23]  Jangeun Jun,et al.  Theoretical maximum throughput of IEEE 802.11 and its applications , 2003, Second IEEE International Symposium on Network Computing and Applications, 2003. NCA 2003..