Link layer security for SAHN protocols

Wireless networks are at risk of security attacks since transmissions can be intercepted by anyone within the transmission range. Therefore participating entities should incorporate robust systems to withstand the attacks as rigorously as possible. In this paper we present a link level security protocol (LLSP) to be deployed in a suburban ad-hoc network (SAHN) (Pose and Kopp, 1998). A SAHN aims to provide suburban area connectivity for local area networks at broadband speed with a low initial cost and zero service charges using wireless technology. LLSP provides services for authentication, integrity assurance, encryption and detection of misbehaving neighbors to ensure security at the data link layer. We propose a design framework to integrate LLSP within existing MAC protocols (e.g. IEEE 802.11b) and estimate the computational and communication overhead of LLSP. Results show that LLSP's overhead should not adversely affect the normal flow of traffic. Moreover, comparisons with existing solutions indicate that LLSP is a suitable link-level security service for an ad-hoc network similar to a SAHN.

[1]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[2]  Panagiotis Papadimitratos,et al.  Secure link state routing for mobile ad hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[3]  Sunggu Lee,et al.  Design and implementation of a private and public key crypto processor and its application to a security system , 2004, IEEE Trans. Consumer Electron..

[4]  Carlo Kopp,et al.  A Router Architecture to Achieve Link Rate Throughput in Suburban Ad-hoc Networks , 2003, Asia-Pacific Computer Systems Architecture Conference.

[5]  Akashi Satoh,et al.  A 10 Gbps full-AES crypto design with a twisted-BDD S-Box architecture , 2002, Proceedings. IEEE International Conference on Computer Design: VLSI in Computers and Processors.

[6]  Hung-Yun Hsieh,et al.  IEEE 802.11 over multi-hop wireless networks: problems and new perspectives , 2002, Proceedings IEEE 56th Vehicular Technology Conference.

[7]  Dharma P. Agrawal,et al.  A novel authentication scheme for ad hoc networks , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).

[8]  Carlo Kopp,et al.  Multiple directional antennas in suburban ad-hoc networks , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[9]  Yvo Desmedt,et al.  Shared Generation of Authenticators and Signatures (Extended Abstract) , 1991, CRYPTO.

[10]  Jangeun Jun,et al.  Theoretical maximum throughput of IEEE 802.11 and its applications , 2003, Second IEEE International Symposium on Network Computing and Applications, 2003. NCA 2003..

[11]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[12]  Robin Kravets,et al.  Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.

[13]  Jiejun Kong,et al.  Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[14]  Ronald Pose Password-capabilities: their evolution from the password-capability system into Walnut and beyond , 2001, Proceedings 6th Australasian Computer Systems Architecture Conference. ACSAC 2001.

[15]  Carlo Kopp,et al.  Bypassing the Home Computing Bottleneck: The Suburban Area Network , 1998 .

[16]  Robert S. Fabry,et al.  Capability-based addressing , 1974, CACM.

[17]  Arjen K. Lenstra,et al.  Selecting Cryptographic Key Sizes , 2000, Public Key Cryptography.

[18]  Jim Binkley,et al.  Authenticated Ad Hoc Routing at the Link Layer for Mobile Systems , 2001, Wirel. Networks.

[19]  Soner Yesil,et al.  Two fast RSA implementations using high-radix montgomery algorithm , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).

[20]  B. Brown 802.11: the security differences between b and i , 2003 .