DocumentCode :
1973258
Title :
Towards a secure fair MAC in wireless ad hoc networks using trusted computing technology
Author :
Cheng, Andrew ; Qiao Li ; Negi, Richa
Author_Institution :
Electr. & Comput. Eng, Carnegie Mellon Univ., Pittsburgh, PA, USA
fYear :
2012
fDate :
3-7 Dec. 2012
Firstpage :
1023
Lastpage :
1028
Abstract :
There are many protocols for MAC-layer rate control and scheduling of wireless ad hoc networks. Yet, network nodes are often compromised, and thus cannot trust one another to be running a given protocol correctly. This paper proposes a secure protocol for fair rate allocation and rate-stable scheduling at the MAC layer for wireless ad hoc networks. We assume the physical hardware is secure, and design our protocol to be secure against software attacks, i.e., hacking. Software vulnerabilities are divided into three parts: (1) the inputs to the program; (2) the program itself; (3) the output of the program. Our proposed secure fair MAC protocol leverages trusted computing technology. A typical (insecure) fair MAC protocol is first described, and simulations show that our proposed secure fair MAC protocol achieves comparable performance even while under attack.
Keywords :
access protocols; ad hoc networks; cryptographic protocols; trusted computing; MAC layer rate control; fair rate allocation; protocols; rate stable scheduling; secure fair MAC protocol; secure protocol; software attacks; software vulnerability; trusted computing technology; wireless ad hoc networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Global Communications Conference (GLOBECOM), 2012 IEEE
Conference_Location :
Anaheim, CA
ISSN :
1930-529X
Print_ISBN :
978-1-4673-0920-2
Electronic_ISBN :
1930-529X
Type :
conf
DOI :
10.1109/GLOCOM.2012.6503247
Filename :
6503247
Link To Document :
بازگشت