• DocumentCode
    1973258
  • Title

    Towards a secure fair MAC in wireless ad hoc networks using trusted computing technology

  • Author

    Cheng, Andrew ; Qiao Li ; Negi, Richa

  • Author_Institution
    Electr. & Comput. Eng, Carnegie Mellon Univ., Pittsburgh, PA, USA
  • fYear
    2012
  • fDate
    3-7 Dec. 2012
  • Firstpage
    1023
  • Lastpage
    1028
  • Abstract
    There are many protocols for MAC-layer rate control and scheduling of wireless ad hoc networks. Yet, network nodes are often compromised, and thus cannot trust one another to be running a given protocol correctly. This paper proposes a secure protocol for fair rate allocation and rate-stable scheduling at the MAC layer for wireless ad hoc networks. We assume the physical hardware is secure, and design our protocol to be secure against software attacks, i.e., hacking. Software vulnerabilities are divided into three parts: (1) the inputs to the program; (2) the program itself; (3) the output of the program. Our proposed secure fair MAC protocol leverages trusted computing technology. A typical (insecure) fair MAC protocol is first described, and simulations show that our proposed secure fair MAC protocol achieves comparable performance even while under attack.
  • Keywords
    access protocols; ad hoc networks; cryptographic protocols; trusted computing; MAC layer rate control; fair rate allocation; protocols; rate stable scheduling; secure fair MAC protocol; secure protocol; software attacks; software vulnerability; trusted computing technology; wireless ad hoc networks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Global Communications Conference (GLOBECOM), 2012 IEEE
  • Conference_Location
    Anaheim, CA
  • ISSN
    1930-529X
  • Print_ISBN
    978-1-4673-0920-2
  • Electronic_ISBN
    1930-529X
  • Type

    conf

  • DOI
    10.1109/GLOCOM.2012.6503247
  • Filename
    6503247