Network security: design, analysis and tradeoff evaluation

Energy efficiency is an essential requirement for all wireless devices. Recent developments in wireless sensor networks (WSNs), wireless local area networks (WLANs) and wireless personal area networks (WPANs) have raised a demand for energy-efficient algorithms and energy-efficient medium access control (MAC) protocols. When considering security in this context, additional overhead is added to the network and efforts must to be made to minimize the extra load while at the same time achieving the desired level of security. Security attacks in the Internet are linked to a different set of vulnerabilities. The complex architecture of the Internet spanning over different administrative domains and legal systems makes it easy for attackers to conceal the source of the attack and preserve their anonymity. This dissertation addresses several important issues in network security and performance including intrusion detection, cipher design, security overhead analysis and tracing, as follows. We first propose a model for intrusion detection in WSNs, which optimizes network coverage and detection while minimizing the number of sensors and energy consumption. We then integrate a security mechanism into the sensor network in order to achieve secure communication. Specifically, we propose a lightweight block cipher based on a multiple recursive generator (MRG) which is suitable for WSN and RFID where power consumption, bandwidth, memory and storage space are critical. Next, we consider security in WLANs and WPANs and we apply the advanced encryption standard (AES) cipher to ensure secure transmission of frames. We integrate AES encryption at the MAC layer of 802.11 WLANs and 802.15.3 UWB WPANs, respectively, and study the overhead introduced by AES in this context. Finally, we analyze a type of security attack in the Internet where the intruder uses a chain of host machines before attacking the target. We discuss two mechanisms for tracing intruders in the Internet, one based on thumbprinting, and the other on a timestamping technique of transmission activities.

[1]  Yang Xiao,et al.  Radio frequency identification: technologies, applications, and research issues , 2007, Wirel. Commun. Mob. Comput..

[2]  Yang Xiao,et al.  IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, PAPER ID: TPDS-0307-0605.R1 1 Random Coverage with Guaranteed Connectivity: Joint Scheduling for Wireless Sensor Networks , 2022 .

[3]  G. Racherla,et al.  Ultra-wideband systems for data communications , 2002, 2002 IEEE International Conference on Personal Wireless Communications.

[4]  Yang Xiao IEEE 802.11 performance enhancement via concatenation and piggyback mechanisms , 2005, IEEE Transactions on Wireless Communications.

[5]  Sang Lyul Min,et al.  Caller Identification System in the Internet Environment , 1993 .

[6]  Harald Niederreiter,et al.  Introduction to finite fields and their applications: List of Symbols , 1986 .

[7]  Yang Xiao,et al.  A Lightweight Secure Solution for RFID. , 2006 .

[8]  Simon Heron,et al.  Encryption: Advanced Encryption Standard (AES) , 2009 .

[9]  Xiaojiang Du,et al.  Intrusion Objects with Shapes under Randomized Scheduling Algorithm in Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[10]  Yang Xiao,et al.  Performance analysis and enhancement for the current and future IEEE 802.11 MAC protocols , 2003, MOCO.

[11]  Edward W. Knightly,et al.  Opportunistic media access for multirate ad hoc networks , 2002, MobiCom '02.

[12]  Songwu Lu,et al.  PEAS: a robust energy conserving protocol for long-lived sensor networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[13]  Xin Chen,et al.  Design and Analysis of Sensing Scheduling Algorithms under Partial Coverage for Object Detection in Sensor Networks , 2007, IEEE Transactions on Parallel and Distributed Systems.

[14]  Miodrag Potkonjak,et al.  Coverage problems in wireless ad-hoc sensor networks , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[15]  Yang Xiao,et al.  Efficient MAC strategies for the IEEE 802.11n wireless LANs , 2006, Wirel. Commun. Mob. Comput..

[16]  David Thomas,et al.  The Art in Computer Programming , 2001 .

[17]  Lih-Yuan Deng,et al.  Efficient and portable multiple recursive generators of large order , 2005, TOMC.

[18]  Weihua Zhuang,et al.  Medium access control in ultra-wideband wireless networks , 2005, IEEE Transactions on Vehicular Technology.

[19]  Yang Xiao,et al.  Optimal ACK mechanisms of the IEEE 802.15.3 MAC for ultra-wideband systems , 2006, IEEE Journal on Selected Areas in Communications.

[20]  Yang Xiao,et al.  Low-cost wireless sensor networks for remote cardiac patients monitoring applications , 2008, Wirel. Commun. Mob. Comput..

[21]  Li Liu,et al.  A Virtual Password Scheme to Protect Passwords , 2008, 2008 IEEE International Conference on Communications.

[22]  David Malone,et al.  Aggregation With Fragment Retransmission for Very High-Speed WLANs , 2009, IEEE/ACM Transactions on Networking.

[23]  Mingyan Liu,et al.  Network coverage using low duty-cycled sensors: random & coordinated sleep algorithms , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[24]  Ying Zhang,et al.  Asymptotic Coverage and Detection in Randomized Scheduling Algorithm in Wireless Sensor Networks , 2007, 2007 IEEE International Conference on Communications.

[25]  Mani B. Srivastava,et al.  Adaptive frame length control for improving wireless link throughput, range, and energy efficiency , 1998, Proceedings. IEEE INFOCOM '98, the Conference on Computer Communications. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Gateway to the 21st Century (Cat. No.98.

[26]  Jan Brinkhuis,et al.  Optimization Insights and Applications , 2010 .

[27]  Yang Xiao,et al.  Security and privacy in RFID and applications in telemedicine , 2006, IEEE Commun. Mag..

[28]  P. K. Sahoo,et al.  Mean Value Theorems and Functional Equations , 1998 .

[29]  J. Tourrilhes Packet frame grouping: improving IP multimedia performance over CSMA/CA , 1998, ICUPC '98. IEEE 1998 International Conference on Universal Personal Communications. Conference Proceedings (Cat. No.98TH8384).

[30]  Sync TGn TGn Sync Proposal Technical Specification , 2004 .

[31]  Mihir Bellare,et al.  The Security of the Cipher Block Chaining Message Authentication Code , 2000, J. Comput. Syst. Sci..

[32]  Sunghyun Choi,et al.  EBA: an enhancement of the IEEE 802.11 DCF via distributed reservation , 2005, IEEE Transactions on Mobile Computing.

[33]  Xiaojiang Du,et al.  Weaving a Proper Net to Catch Large Objects , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[34]  R. J. Lopez An Implicit Function , 1994 .

[35]  Dennis K. J. Lin,et al.  Random Number Generation for the New Century , 2000 .

[36]  Tian He,et al.  Differentiated surveillance for sensor networks , 2003, SenSys '03.

[37]  G. Marsaglia,et al.  Fast Generation of Discrete Random Variables , 2004 .

[38]  Nitin H. Vaidya,et al.  A wireless MAC protocol using implicit pipelining , 2006, IEEE Transactions on Mobile Computing.

[39]  Yang Xiao,et al.  A lightweight secure protocol for wireless sensor networks , 2006, Comput. Commun..

[40]  Hsiao-Hwa Chen,et al.  IEEE 802.11n MAC frame aggregation mechanisms for next-generation high-throughput WLANs , 2008, IEEE Wireless Communications.

[41]  Yang Xiao,et al.  Fragmentation and AES Encryption Overhead in Very High-Speed Wireless LANs , 2009, 2009 IEEE International Conference on Communications.

[42]  Huaping Liu,et al.  Ultra-wideband for multiple access communications , 2005, IEEE Communications Magazine.

[43]  Ieee . Wg Part 11 : Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification , 2003 .

[44]  Yang Xiao,et al.  Throughput and delay limits of IEEE 802.11 , 2002, IEEE Communications Letters.

[45]  Fei Hu,et al.  Error-resistant RFID-assisted wireless sensor networks for cardiac telehealthcare , 2009 .

[46]  Yang Xiao,et al.  A Survey of Energy-Efficient Scheduling Mechanisms in Sensor Networks , 2006, Mob. Networks Appl..

[47]  Xi Chen,et al.  An energy diffserv and application-aware MAC scheduling for VBR streaming video in the IEEE 802.15.3 high-rate wireless personal area networks , 2006, Comput. Commun..

[48]  Frederic P. Miller,et al.  Advanced Encryption Standard , 2009 .

[49]  Stuart Staniford-Chen,et al.  Holding intruders accountable on the Internet , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.

[50]  Brian A. Carter,et al.  Advanced Encryption Standard , 2007 .

[51]  Lih-Yuan Deng,et al.  Design and Implementation of Efficient and Portable Multiple Recursive Generators with Few Zero Coefficients , 2008 .

[52]  Di Tian,et al.  A coverage-preserving node scheduling scheme for large wireless sensor networks , 2002, WSNA '02.

[53]  Yang Xiao,et al.  A Lightweight Block Cipher Based on a Multiple Recursive Generator , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[54]  Xiaojiang Du,et al.  An Optimal Sensor Network for Intrusion Detection , 2009, 2009 IEEE International Conference on Communications.

[55]  Kin K. Leung,et al.  On optimizing backoff counter reservation and classifying stations for the IEEE 802.11 distributed wireless LANs , 2006, IEEE Transactions on Parallel and Distributed Systems.

[56]  W. H. Payne,et al.  Coding the Lehmer pseudo-random number generator , 1969, CACM.

[57]  E. Watson Primitive Polynomials (Mod 2) , 1962 .

[58]  Ashish Goel,et al.  Set k-cover algorithms for energy efficient monitoring in wireless sensor networks , 2003, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[59]  Yang Xiao,et al.  Error-resistant RFID-assisted wireless sensor networks for cardiac telehealthcare , 2009, Wirel. Commun. Mob. Comput..

[60]  Yang Xiao,et al.  Optimization between AES security and performance for IEEE 802.15.3 WPAN , 2009, IEEE Transactions on Wireless Communications.

[61]  Kang-Won Lee,et al.  Traffic analysis in anonymous MANETs , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[62]  Hisashi Kobayashi,et al.  Modeling and analysis , 1978 .

[63]  David Malone,et al.  A new MAC scheme for very high-speed WLANs , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[64]  Yang Xiao,et al.  MAC Security and Security Overhead Analysis in the IEEE 802.15.4 Wireless Sensor Networks , 2006, EURASIP J. Wirel. Commun. Netw..

[65]  Yang Xiao,et al.  IEEE 802.11n: enhancements for higher throughput in wireless LANs , 2005, IEEE Wireless Communications.

[66]  V. Vitsas,et al.  Enhancing performance of the IEEE 802.11 distributed coordination function via packet bursting , 2004, IEEE Global Telecommunications Conference Workshops, 2004. GlobeCom Workshops 2004..

[67]  James P. Titus,et al.  Security and Privacy , 1967, 2022 IEEE Future Networks World Forum (FNWF).

[68]  Yang Xiao,et al.  Modeling Detection Metrics in Randomized Scheduling Algorithm in Wireless Sensor Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[69]  Lih-Yuan Deng,et al.  A system of high-dimensional, efficient, long-cycle and portable uniform random number generators , 2003, TOMC.

[70]  Yang Xiao,et al.  Robust medical ad hoc sensor networks (MASN) with wavelet-based ECG data mining , 2008, Ad Hoc Networks.

[71]  Thierry Turletti,et al.  Modeling and analysis of slow CW decrease IEEE 802.11 WLAN , 2003, 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003..

[72]  Pierre L'Ecuyer,et al.  Bad Lattice Structures for Vectors of Nonsuccessive Values Produced by Some Linear Recurrences , 1997, INFORMS J. Comput..

[73]  Yang Xiao,et al.  Security co-existence of wireless sensor networks and RFID for pervasive computing , 2008, Comput. Commun..

[74]  Bo Sun,et al.  Performance Analysis of Advanced Encryption Standard (AES). , 2006 .

[75]  Granino A. Korn,et al.  Mathematical handbook for scientists and engineers. Definitions, theorems, and formulas for reference and review , 1968 .