TY - GEN
T1 - Security implications of cooperative communications in wireless networks
AU - Makda, Salik
AU - Choudhary, Ankur
AU - Ramant, Naveen
AU - Korakis, Thanasis
AU - Tao, Zhifeng
AU - Panwar, Shivendra
PY - 2008
Y1 - 2008
N2 - Cooperative communications is an innovative technique that is expected to change the behavior of wireless networks in the near feature. In the MAC layer, this technique defines new protocols by enabling additional collaboration from stations that otherwise will not directly participate in the transmission. A typical example of such a protocol is CoopMAC [1], a cooperative MAC protocol that involves an intermediate station or helper in the communication between a transmitter and a receiver. Under this scheme, the transmitter sends its packets to the receiver by forwarding them through the helper. In this way the protocol takes advantage of spatial diversity and faster two-hop transmission, significantly improving the performance of the network. In such an environment, where the sender relies on an intermediate helper to forward its packets to the original destination, numerous security issues may arise. The present security schemes need to be adapted in order to support end-to-end security in the source-helper-destination communication model. In this paper we discuss the potential security issues that cooperation may raise and propose two new security schemes to address those concerns. To evaluate the feasibility of the proposed algorithms, we implement them using open source drivers platform, which is explained in the paper in detail. Moreover, the paper also discusses the design challenges encounterd and share the experience and insights gained during implementation. Our implementations of the suggested techniques allow the WEP, WPA and WPA2 (802.11i) security protocols to successfully operate in the new cooperative environment.
AB - Cooperative communications is an innovative technique that is expected to change the behavior of wireless networks in the near feature. In the MAC layer, this technique defines new protocols by enabling additional collaboration from stations that otherwise will not directly participate in the transmission. A typical example of such a protocol is CoopMAC [1], a cooperative MAC protocol that involves an intermediate station or helper in the communication between a transmitter and a receiver. Under this scheme, the transmitter sends its packets to the receiver by forwarding them through the helper. In this way the protocol takes advantage of spatial diversity and faster two-hop transmission, significantly improving the performance of the network. In such an environment, where the sender relies on an intermediate helper to forward its packets to the original destination, numerous security issues may arise. The present security schemes need to be adapted in order to support end-to-end security in the source-helper-destination communication model. In this paper we discuss the potential security issues that cooperation may raise and propose two new security schemes to address those concerns. To evaluate the feasibility of the proposed algorithms, we implement them using open source drivers platform, which is explained in the paper in detail. Moreover, the paper also discusses the design challenges encounterd and share the experience and insights gained during implementation. Our implementations of the suggested techniques allow the WEP, WPA and WPA2 (802.11i) security protocols to successfully operate in the new cooperative environment.
KW - Cooperative MAC protocols
KW - Cooperative communications
KW - Open source implementation
KW - Wireless security
UR - http://www.scopus.com/inward/record.url?scp=49049091624&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=49049091624&partnerID=8YFLogxK
U2 - 10.1109/SARNOF.2008.4520069
DO - 10.1109/SARNOF.2008.4520069
M3 - Conference contribution
AN - SCOPUS:49049091624
SN - 1424418437
SN - 9781424418435
T3 - Proceedings of the 2008 IEEE Sarnoff Symposium, SARNOFF
BT - Proceedings of the 2008 IEEE Sarnoff Symposium, SARNOFF
T2 - 2008 IEEE Sarnoff Symposium, SARNOFF
Y2 - 28 April 2008 through 30 April 2008
ER -