Secure Wireless Network with Movable Base Stations

SUMMARY Security, flexibility, and scalability are critical to the success of wireless communications. Wireless networks with movable base stations combine the advantages of mobile ad hoc networks and wireless LANto achieve these goals. Hierarchical mobile wireless network (HMWN) is proposed for supporting movable base stations. In such a system, mobile hosts are organized into hierarchical groups. The group agents serve as a distributed trust entity. A secure packet forwarding algorithm and an authentication and key exchange protocol are developed to protect the network infrastructure. A roaming support mechanism and the associated mutual authentication protocol are proposed to secure the foreign group and the mobile host when it roams within the network. The computation overhead of secure packet forwarding and roaming support algorithms is studied via experiments. The results demonstrate that these two security mechanisms only require, respectively, less than 2% and 0.2% to 5% CPU time in a low-end 700 MHz PC.

[1]  Michael D. Zoltowski,et al.  Low complexity anti-jam space-time processing for GPS , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[2]  Sanjay Kumar Madria,et al.  Tech Report 2000-07 Fault-tolerant Authentication and Group Key Management in Mobile Computing , 2000 .

[3]  Stefan Schlott,et al.  Securing ad hoc routing protocols , 2004, Proceedings. 30th Euromicro Conference, 2004..

[4]  Baruch Awerbuch,et al.  An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.

[5]  Aura Ganz,et al.  Security protocol for IEEE 802.11 wireless local area network , 1998, Mob. Networks Appl..

[6]  Martín Abadi,et al.  A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[7]  Chad Scott Bergstrom,et al.  Advanced interference rejection and anti-jam methods for low power mobile battlefield communications , 1997, MILCOM 97 MILCOM 97 Proceedings.

[8]  Thomas E. Daniels,et al.  Packet Tracker Final Report , 2001 .

[9]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[10]  Bharat K. Bhargava,et al.  Study of distance vector routing protocols for mobile ad hoc networks , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..

[11]  Bharat Bhargava,et al.  Hierarchical structure for supporting movable base stations in wireless networks , 2003, 10th International Conference on Telecommunications, 2003. ICT 2003..

[12]  Ram Ramanathan,et al.  On the scalability of ad hoc routing protocols , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.