Skip to main content

Analysis of Security Vulnerability and Authentication Mechanism in Cooperative Wireless Networks

  • Conference paper
  • First Online:
IT Convergence and Services

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 107))

  • 1066 Accesses

Abstract

In this paper, we study the security vulnerabilities a CoopMAC faces and authentication mechanisms suitable for cooperative networks to be achieved. We identify various security attacks against control packets of CoopMAC and security vulnerabilities caused by these attacks, and discuss channel-based non-cryptographic mechanisms for user authentication in CoopMAC using physical layer characteristics.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Nosratinia A, Hunter TE, Hedayat A (2004) Cooperative communication in wireless networks. IEEE Commun Mag 42(10):74–80

    Article  Google Scholar 

  2. Laneman JN, Tse DNC, Wornell GW (2004) Cooperative diversity in wireless networks: efficient protocols and outage behavior. IEEE Trans Inform Theory 50(12):3062–3080

    Article  MathSciNet  Google Scholar 

  3. Part 11: (2003) Wireless LAN medium access control (MAC) and Physical layer (PHY) specifications, ANSI/IEEE Std 802.11, 1999 Edition (R2003)

    Google Scholar 

  4. Liu P, Tao Z, Panwar S (2005) A cooperative MAC protocol for wireless local area networks. Proceedings of the 2005 IEEE ICC, pp 2962–2968

    Google Scholar 

  5. Korakis T, Tao Z, Makda S, Gitelman B (2007) It is better to give than to receive—Implications of cooperation in a real environment. Springer LNCS 4479, pp 427–438

    Google Scholar 

  6. Makda S, Choudhary A, Raman N, Korakis T, Tao Z, Panwar S (2008) Security implications of cooperative communications in wireless networks. In: Proceedings of the 2008 IEEE sarnoff symposium, pp 1–6

    Google Scholar 

  7. Kulkarni S, Agrawal P (2010) Safeguarding cooperation in synergy MAC. In: Proceedings of the 2010 SSST, pp 156–160

    Google Scholar 

  8. Mao Y, Wu M (2007) Tracing malicious relays in cooperative wireless communications. IEEE Trans Inform Forensics Secur 2(2):198–207

    Article  Google Scholar 

  9. Han Z, Sun YL (2007) Securing cooperative transmission in wireless communications. In: Proceedings of the 2007 IEEE MobiQuitous, pp 1–6

    Google Scholar 

  10. Dehnie S, Sencar HT, Memon N (2007) Cooperative diversity in the presence of a misbehaving relay: performance analysis. In: Proceedings of the IEEE Sarnoff Symposium, pp 1–7

    Google Scholar 

  11. Dehnie S, Sencar HT, Memon N (2007) Detecting malicious behavior in cooperative diversity. In: Proceedings of the 2007 IEEE CISS, pp 895–899

    Google Scholar 

  12. Dehnie S, Memon N (2008) A stochastic model for misbehaving relays in cooperative diversity. In: Proceedings of the 2008 IEEE WCNS, pp 482–487

    Google Scholar 

  13. Marques H, Ribeiro J, Marques P, Zuquete A, Rodriguez J (2009) A security framework for cognitive radio IP based cooperative protocols. In: Proceedings of the 2009 IEEE PIMRC, pp 2838–2842

    Google Scholar 

  14. Zeng K, Govindan K, Mohapatra P (2010) Non-cryptographic authentication and identification in wireless networks. IEEE Wirel Commun 17(5):56–62

    Article  Google Scholar 

  15. Xiao L, Greenstein L, Mandayam N, Trappe W (2008) Using the physical layer for wireless authentication in time-variant channels. IEEE Wirel Commun 7(7):2571–2579

    Article  Google Scholar 

  16. Yu PL, Baras JS, Sadler BM (2008) Physical-layer authentication. IEEE Trans Inform Forensics Secur 3(1):38–50

    Article  Google Scholar 

  17. Mathur S (2010) Exploiting the physical layer for enhanced security. IEEE Wirel Commun 17(5):63–70

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ki Hong Kim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media B.V.

About this paper

Cite this paper

Kim, K.H. (2011). Analysis of Security Vulnerability and Authentication Mechanism in Cooperative Wireless Networks. In: Park, J., Arabnia, H., Chang, HB., Shon, T. (eds) IT Convergence and Services. Lecture Notes in Electrical Engineering, vol 107. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-2598-0_1

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-2598-0_1

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-2597-3

  • Online ISBN: 978-94-007-2598-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics