Analysis of Security Vulnerability and Authentication Mechanism in Cooperative Wireless Networks

  • Ki Hong Kim
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 107)


In this paper, we study the security vulnerabilities a CoopMAC faces and authentication mechanisms suitable for cooperative networks to be achieved. We identify various security attacks against control packets of CoopMAC and security vulnerabilities caused by these attacks, and discuss channel-based non-cryptographic mechanisms for user authentication in CoopMAC using physical layer characteristics.


CoopMAC Cooperative communication Security vulnerability Physical layer security Channel-assisted authentication 


  1. 1.
    Nosratinia A, Hunter TE, Hedayat A (2004) Cooperative communication in wireless networks. IEEE Commun Mag 42(10):74–80CrossRefGoogle Scholar
  2. 2.
    Laneman JN, Tse DNC, Wornell GW (2004) Cooperative diversity in wireless networks: efficient protocols and outage behavior. IEEE Trans Inform Theory 50(12):3062–3080MathSciNetCrossRefGoogle Scholar
  3. 3.
    Part 11: (2003) Wireless LAN medium access control (MAC) and Physical layer (PHY) specifications, ANSI/IEEE Std 802.11, 1999 Edition (R2003)Google Scholar
  4. 4.
    Liu P, Tao Z, Panwar S (2005) A cooperative MAC protocol for wireless local area networks. Proceedings of the 2005 IEEE ICC, pp 2962–2968Google Scholar
  5. 5.
    Korakis T, Tao Z, Makda S, Gitelman B (2007) It is better to give than to receive—Implications of cooperation in a real environment. Springer LNCS 4479, pp 427–438Google Scholar
  6. 6.
    Makda S, Choudhary A, Raman N, Korakis T, Tao Z, Panwar S (2008) Security implications of cooperative communications in wireless networks. In: Proceedings of the 2008 IEEE sarnoff symposium, pp 1–6Google Scholar
  7. 7.
    Kulkarni S, Agrawal P (2010) Safeguarding cooperation in synergy MAC. In: Proceedings of the 2010 SSST, pp 156–160Google Scholar
  8. 8.
    Mao Y, Wu M (2007) Tracing malicious relays in cooperative wireless communications. IEEE Trans Inform Forensics Secur 2(2):198–207CrossRefGoogle Scholar
  9. 9.
    Han Z, Sun YL (2007) Securing cooperative transmission in wireless communications. In: Proceedings of the 2007 IEEE MobiQuitous, pp 1–6Google Scholar
  10. 10.
    Dehnie S, Sencar HT, Memon N (2007) Cooperative diversity in the presence of a misbehaving relay: performance analysis. In: Proceedings of the IEEE Sarnoff Symposium, pp 1–7Google Scholar
  11. 11.
    Dehnie S, Sencar HT, Memon N (2007) Detecting malicious behavior in cooperative diversity. In: Proceedings of the 2007 IEEE CISS, pp 895–899Google Scholar
  12. 12.
    Dehnie S, Memon N (2008) A stochastic model for misbehaving relays in cooperative diversity. In: Proceedings of the 2008 IEEE WCNS, pp 482–487Google Scholar
  13. 13.
    Marques H, Ribeiro J, Marques P, Zuquete A, Rodriguez J (2009) A security framework for cognitive radio IP based cooperative protocols. In: Proceedings of the 2009 IEEE PIMRC, pp 2838–2842Google Scholar
  14. 14.
    Zeng K, Govindan K, Mohapatra P (2010) Non-cryptographic authentication and identification in wireless networks. IEEE Wirel Commun 17(5):56–62CrossRefGoogle Scholar
  15. 15.
    Xiao L, Greenstein L, Mandayam N, Trappe W (2008) Using the physical layer for wireless authentication in time-variant channels. IEEE Wirel Commun 7(7):2571–2579CrossRefGoogle Scholar
  16. 16.
    Yu PL, Baras JS, Sadler BM (2008) Physical-layer authentication. IEEE Trans Inform Forensics Secur 3(1):38–50CrossRefGoogle Scholar
  17. 17.
    Mathur S (2010) Exploiting the physical layer for enhanced security. IEEE Wirel Commun 17(5):63–70CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media B.V. 2011

Authors and Affiliations

  1. 1.The Attached Institute of ETRI YuseongDaejeonThe Republic of Korea

Personalised recommendations