{"title":"Safeguarding cooperation in Synergy MAC","authors":"S. Kulkarni, P. Agrawal","doi":"10.1109/SSST.2010.5442849","DOIUrl":null,"url":null,"abstract":"Cooperative communication is a novel, diversity-improving technique that holds great promise for the future of wireless networks. But in order to fully exploit this diversity realized at the physical layer, the idea of node cooperation needs to be extended to other layers of the protocol stack as well. Synergy MAC is one such extension to the MAC sublayer. As per this protocol, whenever a source intends to transmit some data to the destination, it solicits the support of its neighbors for the ensuing data transfer. When one a willing neighbor is identified as the relay, the source transmits its data to the destination by forwarding it via the enlisted relay. In doing this, not only does Synergy MAC realize spatial diversity but is also able to achieve faster transmission speeds. However, relay assisted two hop transmission in Synergy MAC gives rise to numerous concerns about its security. To address these concerns, appropriate security schemes need to be adapted to suit Synergy MAC. In this paper, we discuss various security issues introduced by cooperation in Synergy MAC and utilize two security schemes to address those problems. The techniques that are discussed here enable popular security schemes like WEP, WPA and WPA2 to successfully operate with Synergy MAC.","PeriodicalId":6463,"journal":{"name":"2010 42nd Southeastern Symposium on System Theory (SSST)","volume":"16 1","pages":"156-160"},"PeriodicalIF":0.0000,"publicationDate":"2010-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 42nd Southeastern Symposium on System Theory (SSST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SSST.2010.5442849","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
Cooperative communication is a novel, diversity-improving technique that holds great promise for the future of wireless networks. But in order to fully exploit this diversity realized at the physical layer, the idea of node cooperation needs to be extended to other layers of the protocol stack as well. Synergy MAC is one such extension to the MAC sublayer. As per this protocol, whenever a source intends to transmit some data to the destination, it solicits the support of its neighbors for the ensuing data transfer. When one a willing neighbor is identified as the relay, the source transmits its data to the destination by forwarding it via the enlisted relay. In doing this, not only does Synergy MAC realize spatial diversity but is also able to achieve faster transmission speeds. However, relay assisted two hop transmission in Synergy MAC gives rise to numerous concerns about its security. To address these concerns, appropriate security schemes need to be adapted to suit Synergy MAC. In this paper, we discuss various security issues introduced by cooperation in Synergy MAC and utilize two security schemes to address those problems. The techniques that are discussed here enable popular security schemes like WEP, WPA and WPA2 to successfully operate with Synergy MAC.