CFP last date
20 January 2025
Reseach Article

A Survey on Cross Layer Security

Published on March 2012 by Sandeep Sharma, Rajesh Mishra, Karan Singh
2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013)
Foundation of Computer Science USA
NCIPET - Number 5
March 2012
Authors: Sandeep Sharma, Rajesh Mishra, Karan Singh
87c1cfc1-7268-4117-9865-5f45e05c9c6b

Sandeep Sharma, Rajesh Mishra, Karan Singh . A Survey on Cross Layer Security. 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013). NCIPET, 5 (March 2012), 10-14.

@article{
author = { Sandeep Sharma, Rajesh Mishra, Karan Singh },
title = { A Survey on Cross Layer Security },
journal = { 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013) },
issue_date = { March 2012 },
volume = { NCIPET },
number = { 5 },
month = { March },
year = { 2012 },
issn = 0975-8887,
pages = { 10-14 },
numpages = 5,
url = { /proceedings/ncipet/number5/5223-1035/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013)
%A Sandeep Sharma
%A Rajesh Mishra
%A Karan Singh
%T A Survey on Cross Layer Security
%J 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013)
%@ 0975-8887
%V NCIPET
%N 5
%P 10-14
%D 2012
%I International Journal of Computer Applications
Abstract

Computer network is very essential part of our life by which we can share the information via different technologies such as wired or wireless. Generally the wireless is mostly adopted technology by us due to various advantages like ease of installation, mobility, reconfigure ability, low infrastructural cost etc. but suffers from more attacks as the wireless channel is open. Therefore, many researchers are working in this hot area to secure the wireless communication. Cross layer design refers to protocol design done by actively exploiting the dependence between the protocol layers to obtain better performance gain in the wireless environment. In this paper, we are providing a survey of different security mechanism of cross layer which is the part of wireless network security.

References
  1. N. Borisov, I. Goldberg, and D. Wagner, “Intercepting mobile communications:the insecurity of 802.11,” in Proc. ACM Annual InternationalConference on Mobile Computing and Networking (MOBICOM), pp. 180–189, Sept. 2002.
  2. A. Mishra, M. Shin, and W. A. Arbaugh, “Your 802.11 network has no clothes,” IEEE Commun. Mag., vol. 09, pp. 44–51, Dec. 2002.
  3. A. Mishra and W. A. Arbaugh, “An initial security analysis of the IEEE 802.1x standard,” Tech. Rep. CS-TR-4328, University of Maryland, College Park, 2002.
  4. Vineet Shrivastav, “Cross-Layer Design: A Survey and the Road Ahead,” in IEEE Communication Magazine, 2005, pp. 112-119.
  5. Shantidev Mohanty, Ian Akyildiz, “A Cross-Layer (Layer 2+3) Handoff Management Protocol for Next Generation Wireless System,” in IEEE Transaction on Mobile Computing., vol.5, No. 10, pp. 1347-1360, 2006.
  6. M. Demirbas and Y. Song, “An RSSI-based scheme for sybil attack detection in wireless sensor networks,” in Proc. IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), June 2006.
  7. D. Faria and D. Cheriton, “Detecting identity-based attacks in wireless networks using signalprints,” in Proc. ACM Workshop on Wireless Security, pp. 43–52, Los Angeles, CA, Sept. 2006.
  8. C. Corbett, R. Beyah, and J. Copeland, “A passive approach to wireless NIC identification,” in Proc. IEEE International Conference on Communications, vol. 5, pp. 2329–2334, June 2006.
  9. L. Xiao, L. Greenstein, and N. Mandayam, “Sensor-assisted localization in cellular systems,” IEEE Transactions on Wireless Communications, vol. 6, pp. 4244-4248, Dec. 2007.
  10. L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, “Fingerprints in the ether: Using the physical layer for wireless authentication,” in Proc. IEEE International Conference on Communications (ICC), June 2007, pp. 4646–4651.
  11. Jorgensen, M.L.; Yanakiev, B.R.; Kirkelund, G.E.; Popovski, P.; Yomo, H.; Larsen, T.., “Shout to Secure: Physical-Layer Wireless Security with Known Interference ,” in IEEE Global Telecommunications Conference, 2007. pp. 33-38.
  12. Y. Chen, W. Trappe, and R. Martin, “Detecting and localizing wireless spoofing attacks,” Proc. Sensor, Mesh and Ad Hoc Communications and Networks, pp. 193–202, 2007.
  13. N. Patwari and S. Kasera, “Robust location distinction using temporal link signatures,” in Proc. ACM Int. Conf. Mobile Computing and Networking, 2007, pp. 111–122.
  14. Thamilarasu, Geethapriya; Sridhar, Ramalingam, “Exploring Cross-Layer Techniques for Security: Challenges and Opportunities in Wireless Networks,” IEEE Military Conference, 2007, pp. 1-6.
  15. Nikolaos Gatsis,Alejandro Ribeiro and Georgios B. Giannakis, “A Class of Convergent Algorithms for Resource Allocation in Wireless Fading Networks,” IEEE Trans. On Wireless Comm., vol. 9, no.5, pp. 1808–1823, May. 2008.
  16. T. Melodia and I. F. Akyildiz, “Cross-layer Quality of Service Support for UWB Wireless Multimedia Sensor Networks,” in Proc. IEEE Conference on Computer Communications (INFOCOM), Mini-Conference, Phoenix, AZ, Apr. 2008.
  17. L. Xiao,Larry J. Greenstein ,Narayan B Mandayam, Wade Trappe, “ Using the Physical layer for Wireless Authentication in Time-Variant Channels” IEEE Transactions on Wireless Communication, vol.7, no.7, pp. 2571-2579, July. 2008.
  18. L.Xiao,Larry J. Greenstein ,Narayan B Mandayam, Wade Trappe, “A Physical-Layer Technique to Enhance Authentication for Mobile Terminals” ,” in Proc. IEEE International Conference on Communications, Beijing, China, 2008., pp 1520-1524.
  19. L. Xiao, L. Greenstein, N. Mandayam, and S. Periyalwar, “Distributed measurements for estimating and updating cellular system performance,” IEEE Transactions on Communications, vol. 56, pp. 991-998, Jun. 2008.
  20. L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, “MIMO-assisted channel-based authentication in wireless networks,” in Proc. IEEE Conf. Information Sciences and Systems (CISS), Mar. 2008, pp.642–646.
  21. Yu, P.L.; Baras, J.S.; Sadler, B.M, “Multicarrier Authentication at the Physical Layer,” in Proc. IEEE International Conference on Wireless, Mobile and Multimedia Networks, 2008., pp 1-6.
  22. Xiawen Xiao, Lie Ding, Nanrun Zhou, “An Improved Mechanism for Four-Way Handshake Procedure in IEEES02.11i,” in IEEE International Conference on Computer Science and Information Technology., 2010. pp. 419-422.
  23. Byounghoon Kim , Sungwoo Tak, “A Communication Framework supporting Cross-Layer Design for Wireless Networks,” in Proc International Symposium on Ubiquitous Multimedia Computing, 2008, pp. 232-237.
  24. Jitendra K Tugnait ,Hyosung Kim, “On Channel-Based Authentication for Mobile Terminals,” in Proc. Forty-Third Asilomar Conference on Signals, Systems and Computers, 2009, , pp. 967-971.
  25. N. Gatsis, A. Ribeiro, and G. B. Giannakis, “Cross-layer optimization of wireless fading ad-hoc networks,” in Proc. IEEE Int. Conf. Acoustics,Speech, and Signal Processing, Taipei, Taiwan, Apr. 2009, pp. 2353– 2356.
  26. Di Renzo, M.; Debbah, M., “Wireless physical-layer security: The challenges ahead” International Conference on Advanced Technologies for Communications, 2009.pp. 313 – 316.
  27. L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, “Channel-based detection of Sybil attacks in wireless networks,” IEEE Transactions on Information Forensics & Security , vol.04,no.03,pp. 492-503,Sept.2009.
  28. L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, “Channel-based spoofing detection in frequency-selective Rayleigh channels,” IEEE Transactions on Wireless Communications, vol.8,no.12,pp. 5948 - 5956.Sept.2009.
  29. Harrison, W.K.; Almeida, J.; Klinc, D.; McLaughlin, S.W.; Barros, J., “Stopping sets for physical-layer security ,” in IEEE Information Theory Workshop, 2010, pp. 1-5.
  30. M. Tahir, Sigit P.W Jarot and M.U Siddiqi, “Wireless Physical Layer Security Using Channel State Information,” in International Conference on Computer and Communication Engineering, May 2010. pp. 1-5.
  31. Tommaso Melodia and Ian F. Akydildiz, “Cross-Layer QoS-Aware Communication for Ultra Wide Band Wireless Multimedia Sensor Networks,” IEEE J. Sel. Areas Commun., vol. 28, no. 5, pp. 653–663, June. 2010.
  32. Suhas Mathur, Alex Reznik,Rajat Mukharjee, Akbar Rahman ,Yogesh Shah,Wade Trappe and Narayan Mandayam , “Exploiting the Physical Layer for Enhanced Security,” IEEE Trans. On Wireless Comm., vol. 17, no.5, pp. 71-80, October.2010.
  33. Kai Zeng,Kannan Govindan and Prasant Mohapatra“Non-Cryptographic Authentication and Identification in Wireless Networks,” IEEE Journal On Wireless Comm., vol. 17, no.5, pp. 56-62, October.2010.
  34. Anand Sharma,Vibha Ojha, S.K.Lenka, “Quaantam Key Distribution in WLAN 802.11 Networks,” in International Conference on Networking and Information Technology., 2010. pp. 402-405.
Index Terms

Computer Science
Information Sciences

Keywords

Cross layer Attack Wireless Authentication EAP WEP WPA