{"title":"Secure and efficient authentication in Wireless Mesh Networks using merkle trees","authors":"L. Santhanam, Bin Xie, D. Agrawal","doi":"10.1109/LCN.2008.4664310","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664310","url":null,"abstract":"In the recent years, wireless mesh network (WMN) has evolved as a new paradigm for broadband wireless Internet access. The self-configurability, open wireless infrastructure, and different management styles of WMN make them vulnerable to malicious attackers. As a first step to secure WMNs, it is critical to incorporate an authentication mechanism for mesh clients. The existing proposals are primarily based on public key certificates, which incur considerable overhead in signature verification. We propose a network layer authentication mechanism called Merkle Tree based Mesh Authentication Protocol (MT-MAP) for WMNs. It incorporates inexpensive hash operations using Merkle tree to authenticate single/multihop mesh clients. We also show how the use of hash tree facilitates fast and periodic refresh of authentication certificates. Finally, we present a security analysis of MT-MAP against impersonation and replay attacks.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117316209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Baoke Zhang, Karthik Sabhanatarajan, A. Gordon-Ross, A. George
{"title":"Real-time performance analysis of Adaptive Link Rate","authors":"Baoke Zhang, Karthik Sabhanatarajan, A. Gordon-Ross, A. George","doi":"10.1109/LCN.2008.4664181","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664181","url":null,"abstract":"High speed links are widely deployed in modern day computer networks to meet the ever growing needs for increasing data bandwidth. However, with the increase in the link rate, the power consumption of the network interfaces increases exponentially, compounding growing concerns about network power consumption. Fortunately, network traffic characteristics show that rapid link rates are not always required. During times of reduced network traffic, the adaptive link rate (ALR) mechanism allows link rates to be reduced with little impact on network performance. Current research has focused on policies to control when and how to change link rates, and have shown promising energy savings. However, these works have been largely simulative, and have not addressed many of the challenges involved in implementation. In this paper, we develop a hardware prototype ALR system and address real-time challenges involved in realizing such an implementation. We also identify new considerations for control policy development given current technology capabilities as well as future projections.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114344076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DiCAP: Distributed Packet Capturing architecture for high-speed network links","authors":"C. Morariu, B. Stiller","doi":"10.1109/LCN.2008.4664166","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664166","url":null,"abstract":"IP traffic measurements form the basis of several network management tasks, such as accounting, planning, intrusion detection, and charging. High-speed network links challenge traditional IP traffic analysis tools with their high amount of carried data that needs to be processed within a small amount of time. Centralized traffic measurements for high-speed links typically require high-performance capturing hardware that usually comes with a high cost. Software-based capturing solutions, such as libpcap or PFRING, cannot cope with those high data rates and experience high packet losses. Thus, this paper proposes a scalable architecture and its implementation for Distributed Packet Capturing (DiCAP) based on inexpensive off-the-shelf hardware running Linux operating system. The prototype designed has been tested as an implementation and was evaluated against other Linux capturing tools. The evaluation shows that DiCAP can perform loss-less IP packet header capture at high-speed packet rates when used alone and that it can highly improve the performance of libpcap of PFRING when used in combination with those.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125565701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cost-efficient backup-plane architecture for single-hop WDM network","authors":"N. Kamiyama","doi":"10.1109/LCN.2008.4664189","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664189","url":null,"abstract":"Although an AWG-based single-hop WDM network is a desirable architecture to achieve an all-optical packet network in MANs, scalability is a problem. This problem can be solved by providing optical couplers between the AWG and other nodes and collecting multiple nodes. In this case, packet collisions at couplers will significantly increase the packet network delay. Therefore, the author proposed to install an autonomic packet collision avoidance mechanism in couplers. The installation of active devices at couplers degrades the network reliability. Therefore, we need to improve the reliability by providing a backup plane when applying this method to MANs. However, simply doubling all the couplers will largely increase the CAPEX. The probability that multiple collision-avoidance mechanisms breakdown simultaneously is very small, so this paper proposes to construct the backup plane by sharing couplers among nodes accommodated in different couplers on the primary plane.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125735601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient cooperation of on-demand and proactive modes in Hybrid Wireless Mesh Protocol","authors":"Won-Ju Yoon, Sang-Hwa Chung, S. Lee, Yun-Sung Lee","doi":"10.1109/LCN.2008.4664151","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664151","url":null,"abstract":"Hybrid Wireless Mesh Protocol (HWMP) in IEEE 802.11s provides two routing modes, on-demand and proactive, for WLAN mesh networks. Although the on-demand routing mode always provides the optimum routing paths for data transmission, the initial latency can be very high when communicating with a destination in an external network. On the other hand, the proactive routing mode shows low initial latency when communicating with a destination in an external network, but the data transmission throughput can decrease when communicating with a destination in the same mesh network. This paper proposes an efficient cooperation method of two routing modes, taking advantage of the merits of each routing mode to overcome their faults. To evaluate the performance of the proposed cooperation method, we implemented HWMP on a testbed and performed experiments. The experimental results showed that the proposed cooperation method overcomes the faults of each routing mode and searches for the optimum routing paths quickly and efficiently; it always has the lower initial latency and higher data transmission throughput compared with the on-demand and proactive routing modes.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125993808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Signal strength sensitivity and its effects on routing in maritime wireless networks","authors":"C. Ang, S. Wen","doi":"10.1109/LCN.2008.4664169","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664169","url":null,"abstract":"Unlike terrestrial networks, the received signal strength in maritime wireless networks are subjected to perturbations due to the sea movement. Surface motions at sea cause variations in antenna heights and orientations of the communicating node (e.g. ships and buoys), thus affecting the received signal strength. In order to minimize such undesirable effects, we carried out a detailed study of the relationship between sea waves and the received signal strength. The effect of antenna gain variations due to tilting of antenna masts were studied by modeling sea waves. The channel path-loss variations were studied using a two-ray path-loss model for the maritime environment. Our analysis showed that the sea wave movements affect both short and longer links. We proposed a simple scheme to avoid the use of unstable links and implemented it on the QualNet network simulator. We carried out IEEE 802.16-based mesh network simulations with sea terrain and path loss models. We observed performance improvements in packet delay and throughput when the stable link selection scheme was used.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127347058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Andersson, C. Åhlund, Balkrishna Sharma Gukhool, S. Cherkaoui
{"title":"Mobility management for highly mobile users and vehicular networks in heterogeneous environments","authors":"K. Andersson, C. Åhlund, Balkrishna Sharma Gukhool, S. Cherkaoui","doi":"10.1109/LCN.2008.4664250","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664250","url":null,"abstract":"With the recent developments in wireless networks, different radio access technologies are used in different places depending on capacity in terms of throughput, cell size, scalability etc. In this context, mobile users, and in particular highly mobile users and vehicular networks, will see an increasing number and variety of wireless access points enabling Internet connectivity. Such a heterogeneous networking environment needs, however, an efficient mobility management scheme offering the best connection continuously. In this paper, a mobility management architecture focusing on efficient network selection and timely handling of vertical and horizontal hand-overs is proposed. The solution is based on Mobile IP where hand-over decisions are taken based upon calculations of a metric combining delay and delay jitter. For efficiency reasons, the frequency of binding updates is dynamically controlled, depending on speed and variations in the metric. The dynamic frequency of binding updates helps the timely discovery of congested access points and cell edges so as to allow efficient hand-overs that minimize packet drops and hand-over delays. Results show that the overall signaling cost is decreased and changes in networking conditions are detected earlier compared to standard Mobile IP.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127487532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resource assignment for adaptively modulated interconnected WLANs","authors":"Amiotosh Ghosh, A. Elhakeem","doi":"10.1109/LCN.2008.4664211","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664211","url":null,"abstract":"In this paper we propose resource allocation schemes for TDMA/TDD based high performance link adaptable wireless LANs and examine their interrelation with user buffer. User rates are dynamically adjusted based on their distance from the access points and changes as user moves. We simulate three resource allocation policies namely Minimum Overhead Round Robin (MORR), which does not depend on userpsilas buffer condition, Weighted Minimum Overhead Round Robin (WMORR) which is a function of user buffer as well as the waiting time for transmission opportunity and Weighted Round Robin (WRR) which is a function of user buffer only. We evaluate average buffer packet drop probability due to buffer overflow and average frame overhead in uplink phase of the TDMA/TDD frame. Our results show that the second adaptive resource allocation technique i.e. WMORR outperforms the other two.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125023075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart Spanning Tree Bridging for Metro Ethernets","authors":"A. Meddeb","doi":"10.1109/LCN.2008.4664209","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664209","url":null,"abstract":"Metro Ethernet is taking off rapidly as a WAN service and the simplicity, ubiquity, and plug-and-play features of Ethernet are some key success factors. The original bridging methods assumed the use of VLANs and spanning tree protocols within provider bridge (PB) and provider backbone bridge (PBB) networks. Because of the inadequacy of the existing spanning tree protocols to support carrier network requirements, very recently, a new class of shortest path routing solutions have been introduced that avoid the use of spanning tree protocols in the core namely, shortest path bridging (SPB). This paper aims at illustrating that we can still use spanning trees in metro ethernet provided that the tree generation and VLAN-spanning-tree mapping are performed adequately. We call our solution smart spanning tree bridging (SSTB). SSTB can be used to enhance the 802.1s MSTP, without requiring significant changes in the current Ethernet equipment. Using very simple but yet realistic numerical examples, we show that SSTB yields near optimal bandwidth and link usage. We also show that SSTB outperforms SPB in terms of service delivery, frame loss and jitter, while being comparable in terms of bandwidth usage and latency. Further, SSTB requires only a couple of spanning tree instances, significantly reducing processing and complexity of bridged networks.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122133836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Firewalling wireless sensor networks: Security by wireless","authors":"I. Martinovic, Nicos Gollan, J. Schmitt","doi":"10.1109/LCN.2008.4664279","DOIUrl":"https://doi.org/10.1109/LCN.2008.4664279","url":null,"abstract":"Networked sensors and actuators for purposes from production monitoring and control to home automation are in increasing demand. Until recently, the main focus laid on wired systems, although their deployment requires careful planning and expensive infrastructure that may be difficult to install or modify. Hence, solutions based on wireless sensor networks (WSNs) are gaining popularity to reduce cost and simplify installation. Clearly, one of the key issues rising from the switch to wireless communication lies in security; while an air gap is among the most effective security measures in wired networks, wireless communication is not as easy to isolate from attack. In this paper, we propose a system leveraging the peculiarities of the wireless medium, such as the broadcast nature of wireless communication and the unpredictability of indoor signal propagation to achieve effective protection against attacks based on the injection of fake data. Using a real-world WSN deployment and a realistic implementation of an attacker, we analyze this protection scheme and demonstrate that neither position change, transmission power manipulation, nor complete knowledge of wireless parameters can help an attacker to successfully attack the network. As a result, this work demonstrates how the chaotic nature of radio communication, which is often considered a disadvantage in regard to security objectives, can be used to enhance protection and support implementation of lightweight security mechanisms.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129635452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}