Abstract
In this paper, we study the security vulnerabilities a CoopMAC faces and authentication mechanisms suitable for cooperative networks to be achieved. We identify various security attacks against control packets of CoopMAC and security vulnerabilities caused by these attacks, and discuss channel-based non-cryptographic mechanisms for user authentication in CoopMAC using physical layer characteristics.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Nosratinia A, Hunter TE, Hedayat A (2004) Cooperative communication in wireless networks. IEEE Commun Mag 42(10):74–80
Laneman JN, Tse DNC, Wornell GW (2004) Cooperative diversity in wireless networks: efficient protocols and outage behavior. IEEE Trans Inform Theory 50(12):3062–3080
Part 11: (2003) Wireless LAN medium access control (MAC) and Physical layer (PHY) specifications, ANSI/IEEE Std 802.11, 1999 Edition (R2003)
Liu P, Tao Z, Panwar S (2005) A cooperative MAC protocol for wireless local area networks. Proceedings of the 2005 IEEE ICC, pp 2962–2968
Korakis T, Tao Z, Makda S, Gitelman B (2007) It is better to give than to receive—Implications of cooperation in a real environment. Springer LNCS 4479, pp 427–438
Makda S, Choudhary A, Raman N, Korakis T, Tao Z, Panwar S (2008) Security implications of cooperative communications in wireless networks. In: Proceedings of the 2008 IEEE sarnoff symposium, pp 1–6
Kulkarni S, Agrawal P (2010) Safeguarding cooperation in synergy MAC. In: Proceedings of the 2010 SSST, pp 156–160
Mao Y, Wu M (2007) Tracing malicious relays in cooperative wireless communications. IEEE Trans Inform Forensics Secur 2(2):198–207
Han Z, Sun YL (2007) Securing cooperative transmission in wireless communications. In: Proceedings of the 2007 IEEE MobiQuitous, pp 1–6
Dehnie S, Sencar HT, Memon N (2007) Cooperative diversity in the presence of a misbehaving relay: performance analysis. In: Proceedings of the IEEE Sarnoff Symposium, pp 1–7
Dehnie S, Sencar HT, Memon N (2007) Detecting malicious behavior in cooperative diversity. In: Proceedings of the 2007 IEEE CISS, pp 895–899
Dehnie S, Memon N (2008) A stochastic model for misbehaving relays in cooperative diversity. In: Proceedings of the 2008 IEEE WCNS, pp 482–487
Marques H, Ribeiro J, Marques P, Zuquete A, Rodriguez J (2009) A security framework for cognitive radio IP based cooperative protocols. In: Proceedings of the 2009 IEEE PIMRC, pp 2838–2842
Zeng K, Govindan K, Mohapatra P (2010) Non-cryptographic authentication and identification in wireless networks. IEEE Wirel Commun 17(5):56–62
Xiao L, Greenstein L, Mandayam N, Trappe W (2008) Using the physical layer for wireless authentication in time-variant channels. IEEE Wirel Commun 7(7):2571–2579
Yu PL, Baras JS, Sadler BM (2008) Physical-layer authentication. IEEE Trans Inform Forensics Secur 3(1):38–50
Mathur S (2010) Exploiting the physical layer for enhanced security. IEEE Wirel Commun 17(5):63–70
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media B.V.
About this paper
Cite this paper
Kim, K.H. (2011). Analysis of Security Vulnerability and Authentication Mechanism in Cooperative Wireless Networks. In: Park, J., Arabnia, H., Chang, HB., Shon, T. (eds) IT Convergence and Services. Lecture Notes in Electrical Engineering, vol 107. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-2598-0_1
Download citation
DOI: https://doi.org/10.1007/978-94-007-2598-0_1
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-2597-3
Online ISBN: 978-94-007-2598-0
eBook Packages: EngineeringEngineering (R0)