DocumentCode
1973258
Title
Towards a secure fair MAC in wireless ad hoc networks using trusted computing technology
Author
Cheng, Andrew ; Qiao Li ; Negi, Richa
Author_Institution
Electr. & Comput. Eng, Carnegie Mellon Univ., Pittsburgh, PA, USA
fYear
2012
fDate
3-7 Dec. 2012
Firstpage
1023
Lastpage
1028
Abstract
There are many protocols for MAC-layer rate control and scheduling of wireless ad hoc networks. Yet, network nodes are often compromised, and thus cannot trust one another to be running a given protocol correctly. This paper proposes a secure protocol for fair rate allocation and rate-stable scheduling at the MAC layer for wireless ad hoc networks. We assume the physical hardware is secure, and design our protocol to be secure against software attacks, i.e., hacking. Software vulnerabilities are divided into three parts: (1) the inputs to the program; (2) the program itself; (3) the output of the program. Our proposed secure fair MAC protocol leverages trusted computing technology. A typical (insecure) fair MAC protocol is first described, and simulations show that our proposed secure fair MAC protocol achieves comparable performance even while under attack.
Keywords
access protocols; ad hoc networks; cryptographic protocols; trusted computing; MAC layer rate control; fair rate allocation; protocols; rate stable scheduling; secure fair MAC protocol; secure protocol; software attacks; software vulnerability; trusted computing technology; wireless ad hoc networks;
fLanguage
English
Publisher
ieee
Conference_Titel
Global Communications Conference (GLOBECOM), 2012 IEEE
Conference_Location
Anaheim, CA
ISSN
1930-529X
Print_ISBN
978-1-4673-0920-2
Electronic_ISBN
1930-529X
Type
conf
DOI
10.1109/GLOCOM.2012.6503247
Filename
6503247
Link To Document