An integrated architecture for multi-hop infrastructure wireless networks

Rapid growth in wireless networks has resulted in a growing need for fast and ubiquitous connectivity. Most networks deployed currently are single hop access point (AP) networks, where the end user is connected to an AP if it is within communication range of the AP. While such networks are popular and have been deployed extensively, the inherent low range of Wi-Fi networks limits their coverage. Again, high deployment costs of high speed wired networks do not allow single hop networks to provide ubiquitous and cheap connectivity. Recently, a highly viable solution to the above problem has appeared in the form of multihop infrastructure networks (MINs). A MIN is a network of wireless routers connected to an AP and provides multihop coverage in an area. These networks may present a highly viable and cheap alternative to the problem of universal coverage. While the concept of MINs is exciting, deployment of such networks cannot commence without a thorough inspection of the performance, handoffs mechanisms and security considerations involved. The aim of this thesis is to provide a complete architecture for MINs and explore the various aspects that affect the performance and security of such networks. We solve the problem in a number of phases. First, we provide an analytical framework using which the end-to-end delay and throughput characteristics of the network can be predicted. This framework can then be used to predict the scalability of such networks. The model can also be used for bottleneck determination in such networks and to provide effective routing techniques. The behavior of the delay characteristics of MINs have been effectively addressed by taking both bulk traffic and single arrival traffic into consideration. The queue modeling for forwarder nodes in MINs is complicated by the fact that traditional queuing mechanisms are no longer valid as the arrival and departure processes can never be simultaneous. We propose two different approaches to queuing analysis in MINs. Secondly, we propose to provide an architecture for handoffs in MINs. This involves defining a handoff for MINs, and outlining a method to perform handoffs depending on the parameters that need to be optimized. The suggested protocols should also aim towards minimizing the delays and message overheads involved in the handoff process. Protocols have also been proposed to reduce the delay and message overheads involved in handoffs by the use of pre-authentication mechanisms. Finally, we propose a security architecture for MINs. The first part of this security architecture addresses the problem of key distribution for group communication. The second part of the security architecture allows communication between the members of a MIN by the establishment of robust key agreement protocols for node-to-node pair wise communication. These protocols can be used for ad-hoc network communication as well.

[1]  Nathalie Weiler,et al.  The VersaKey framework: versatile group key management , 1999, IEEE J. Sel. Areas Commun..

[2]  P. Kumar,et al.  Capacity of Ad Hoc Wireless Networks , 2002 .

[3]  William A. Arbaugh,et al.  Proactive key distribution using neighbor graphs , 2004, IEEE Wireless Communications.

[4]  Jiro Yamakita,et al.  Performance analysis of backoff algorithms under unsaturated conditions , 2005 .

[5]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[6]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 2000, TNET.

[7]  B. Feldman,et al.  Self-organizing security scheme for multi-hop wireless access networks , 2004, 2004 IEEE Aerospace Conference Proceedings (IEEE Cat. No.04TH8720).

[8]  Eric J. Harder,et al.  Key Management for Multicast: Issues and Architectures , 1999, RFC.

[9]  Amotz Bar-Noy,et al.  Tracking mobile users in wireless communications networks , 1993, IEEE Trans. Inf. Theory.

[10]  Yitzhak Birk,et al.  Using direction and elapsed-time information to reduce the wireless cost of locating mobile units in cellular networks , 1995, Wirel. Networks.

[11]  Sushil Jajodia,et al.  Kronos: a scalable group re-keying approach for secure multicast , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[12]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[13]  Ahmet M. Eskicioglu,et al.  Multilayer multicast key management with threshold cryptography , 2004, IS&T/SPIE Electronic Imaging.

[14]  Yanghee Choi,et al.  Pre-Authenticated Fast Handoff in a Public Wireless LAN Based on IEEE 802.1x Model , 2002, PWC.

[15]  J. J. Garcia-Luna-Aceves,et al.  Delay analysis of IEEE 802.11 in single-hop networks , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..

[16]  Yu Wang,et al.  Performance of collision avoidance protocols in single-channel ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[17]  Gene Tsudik,et al.  Simple and fault-tolerant key agreement for dynamic collaborative groups , 2000, CCS.

[18]  Dan Simon,et al.  PPP EAP TLS Authentication Protocol , 1999, RFC.

[19]  Donald F. Towsley,et al.  On the capacity of hybrid wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[20]  Shugong Xu,et al.  Does the IEEE 802.11 MAC protocol work well in multihop wireless ad hoc networks? , 2001, IEEE Commun. Mag..

[21]  Haiyun Luo,et al.  UCAN: a unified cellular and ad-hoc network architecture , 2003, MobiCom '03.

[22]  C. D. Litton,et al.  A First Course in Bulk Queues , 1983 .

[23]  Hugh Harney,et al.  Group Key Management Protocol (GKMP) Specification , 1997, RFC.

[24]  Panganamala Ramana Kumar,et al.  RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .

[25]  David Hutchison,et al.  Decentralised group key management , 2002 .

[26]  G. Varghese,et al.  An exercise in formal reasoning about mobile communications , 1998, Proceedings Ninth International Workshop on Software Specification and Design.

[27]  L. Dondeti,et al.  A Distributed Group Key Management Scheme for Secure Many-to-many Communication , 1999 .

[28]  Dharma P. Agrawal,et al.  Threshold and identity-based key management and authentication for wireless ad hoc networks , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[29]  Hugh Harney,et al.  Group Key Management Protocol (GKMP) Architecture , 1997, RFC.

[30]  Randy H. Katz,et al.  Secure Authentication System for Public WLAN Roaming , 2005, Mob. Networks Appl..

[31]  K. Baughan,et al.  Visions of 4G , 2000 .

[32]  Ying-Dar Lin,et al.  Multihop cellular: a new architecture for wireless communications , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[33]  Kevin R. Fall,et al.  The NS Manual (Formerly NS Notes and Documentation , 2002 .

[34]  Jiejun Kong,et al.  Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[35]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1998, Inf. Comput..

[36]  Bob Briscoe MARKS: Multicast Key Management using Arbitrarily Revealed Key Sequences , 1999 .

[37]  Victor C. M. Leung,et al.  Secure Routing for Mobile Ad Hoc Networks , 2006 .

[38]  Lin Wu,et al.  Performance Analysis of CSMA and BTMA Protocols in Multihop Networks (II), Multiple Channel Case , 1999, Inf. Sci..

[39]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[40]  Yanghee Choi,et al.  FAST INTER-AP HANDOFF USING PREDICTIVE AUTHENTICATION SCHEME IN A PUBLIC WIRELESS LAN , 2002 .

[41]  Edward W. Knightly,et al.  End-to-end performance and fairness in multihop wireless backhaul networks , 2004, MobiCom '04.

[42]  Yan Gao,et al.  The fundamental role of hop distance in IEEE 802.11 multi-hop ad hoc networks , 2005, 13TH IEEE International Conference on Network Protocols (ICNP'05).

[43]  Biplab Sikdar,et al.  Queueing analysis and delay mitigation in IEEE 802.11 random access MAC based wireless networks , 2004, IEEE INFOCOM 2004.

[44]  Roberto Battiti,et al.  Analysis of the IEEE 802.11 DCF with Service Differentiation Support in Non-saturation Conditions , 2004, QofIS.

[45]  Gene Tsudik,et al.  Group key agreement efficient in communication , 2004, IEEE Transactions on Computers.

[46]  Ashok Samal,et al.  Scalable secure one-to-many group communication using dual encryption , 2000, Comput. Commun..

[47]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[48]  M. L. Chaudhry,et al.  A first course in bulk queues , 1983 .

[49]  Nitin H. Vaidya,et al.  A Hybrid Network Implementation to Extend Infrastructure Reach , 2003 .

[50]  Dimitri P. Bertsekas,et al.  Data Networks , 1986 .

[51]  J. J. Garcia-Luna-Aceves,et al.  A scalable model for channel access protocols in multihop ad hoc networks , 2004, MobiCom '04.

[52]  Jun He Performance modeling and evaluation of IEEE 802.11 distributed coordination function in multihop wireless networks , 2004, Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955).

[53]  Leandros Tassiulas,et al.  Throughput capacity of random ad hoc networks with infrastructure support , 2003, MobiCom '03.

[54]  A. Girotra,et al.  Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .

[55]  Suvo Mittra,et al.  Iolus: a framework for scalable secure multicasting , 1997, SIGCOMM '97.

[56]  Dawn Xiaodong Song,et al.  ELK, a new protocol for efficient large-group key distribution , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.