Secure Scheduling for Wireless Networks using NxN Wireless Switch

Author: Ma'en Saleh

Abstract:
Wireless networks suffer from security threats, where the open space is the communication session between the wireless nodes. In this paper we propose an adaptive security-aware scheduling algorithm to be installed on a crossbar (N x N) wireless switch in a wireless network. The scheduling unit of such algorithm was built based on Lottery Earliest Deadline First (LEDF) algorithm. From the other side, the security unit was designed based on a resource estimation methodology for both (N x N) switch and end wireless nodes, such that the network performance metrics (NPMs) that keep the network from being congested are met. The proposed algorithm provides guaranteed QoS requirements for three data types of packets: video, audio, and text (best effort) in terms of deadline and miss rate, while adaptively enhances the confidentiality, integrity and authentication security levels for such data types. Overriding the 1st payload byte of the IEEE 802.11 wireless frame format to represent the associated security level for each security service, our proposed algorithm makes the security enhancement process more efficient through: (1) avoiding the security negotiating overhead between a pair of wireless nodes in the case of using a wireless security protocol; (2) avoiding the overhead of the security control messages to the source node in the case of using a feedback security level protocol.

Keywords:
Security, Wireless networks, QoS, Lottery Scheduler, Resource estimation.

Volume 18, Issue 2, February 2014, pp. 858-864                    Download PDF


References:


[1] S. Lee, K. Sriram, K. Kyungsoo, Y. Kim, and N. Golmie,, "Vertical handoff decision algorithms for providing optimized performance in heterogeneous wireless networks," IEEE Trans. on Vehicular Technology, vol. 58, pp. 865 – 881, 2009.
[2] O. Salami, H.A. Chan, and A. Bagula, "Multi-layer resource optimization and QoS guarantee for inter-working wireless networks," Third International Conference on Broadband Communications, Information Technology & Biomedical Applications, pp. 120 – 123, 2008.
[3] V. Gabale, B. Raman, P. Dutta, and S. Kalyanraman, "A Classification framework for scheduling algorithms in wireless mesh networks," IEEE Communications Surveys & Tutorials, vol. 15, pp. 199 – 222, 2013.
[4] M. Srivatsa, "Who is listening? Security in wireless networks," International Conference on Signal Processing, Communications and Networking (ICSCN '08), pp. 167 – 172, 2008.
[5] A.G. Fragkiadakis, E.Z. Tragos, and I.G. Askoxylakis, "A Survey on security threats and detection techniques in cognitive radio networks," IEEE Communications Surveys & Tutorials, vol. 15, pp. 428 – 445, 2013.
[6] M.S. Afaqui, and A. Qureshi, "A review of channel dependent scheduling in wireless networks," 15th International Multitopic Conference (INMIC), pp. 413 – 416, 2012.
[7] M. Mollanoori, and M. Ghaderi, "Fair and efficient scheduling in wireless networks with successive interference cancellation," IEEE Wireless Communications and Networking Conference (WCNC), pp. 221 – 226, 2011.
[8] Q. Zhang, and Y. Zhang, "Cross-layer design for QoS support in multihop wireless networks," IEEE Proceedings, pp. 64 – 76, 2008.
[9] S. Nasser, L. Karim, and T. Taleb, "Dynamic multilevel priority packet scheduling scheme for wireless sensor network," IEEE Trans. on Wireless Communications, vol. 12, no. 4, pp. 1448 – 1459, April 2013.
[10] B. Liu, J. Jhang, and K. Su, "GPS-free event-to-sink routing scheme for data aggregation in wireless sensor networks," Second International Conference on Innovations in Bio-inspired Computing and Applications (IBICA), pp. 25 – 28, 2011.
[11] P. Hao, X. Wang, and A. Refaey, "An enhanced cross-layer authentication mechanism for wireless communications based on PER and RSSI," 13th Canadian Workshop on Information Theory (CWIT), pp. 44 – 48, 2012.
[12] J. Liu, and K.S. Kwak, "Hybrid security mechanisms for wireless body area networks," Second International Conference on Ubiquitous and Future Networks (ICUFN), pp. 98 – 103, 2010.
[13] G. Vithya, and B. Vinayagasundaram, "Actuation sensor with adaptive routing and QOS aware checkpoint arrangement on wireless multimedia sensor Network," International Conference on Recent Trends in Information Technology (ICRTIT), pp. 444 – 449, 2011.
[14] C. Zhu, L.T. Yang, L. Shu, T.Q. Duong, and S. Nishio, " Secured energy-aware sleep scheduling algorithm in duty-cycled sensor networks," IEEE International Conference on Communications (ICC), pp. 1953 – 1957, 2012.
[15] A.J. Banu, and R. Velayutham, "Secure communication in wireless sensor networks using AES algorithm with delay efficient sleep scheduling," International Conference on Emerging Trends in Computing, Communication and Nanotechnology (ICE-CCN), pp. 706 – 711, 2013.
[16] S. Saleem, and N. Zhang, "A Risk-Aware Workload scheduler to support secure and efficient collaborative data transfer in mobile communities," 9th Annual Conference on Wireless On-demand Network Systems and Services (WONS), pp. 31 – 34, 2012.
[17] M. Saleh and L. Dong, " Real-time scheduling with security enhancement for packet switched networks," IEEE Trans. on Network and Service Management, vol. 10, no. 3, pp. 271 – 285, Sep. 2013.
[18] M. Saleh and L. Dong, “Adaptive security-aware scheduling using multiagent system,” in 2012 IEEE International Conference on Communications.
[19] S. Al-Harthi, and R. Rao, "A switch model for improving throughput and power fairness in bluetooth piconets," IEEE Global Telecommunications Conference (GLOBECOM '03), vol. 3, pp. 1279 – 1283, 2003.
[20] D. G. Sullivan, R. Haas, and M.I. Seltzer, " Tickets and Currencies Revisited: Extensions to Multi-Resource Lottery Scheduling," Proceedings of the Seventh Workshop on Hot Topics in Operating Systems, pp. 148-152, Mar. 1999.
[21] C. Xien and J. Zheng, "Novel method in automatic examination for distance education," Second International Workshop on Education Technology and Computer Science (ETCS), vol. 1, pp. 582-585, 2010.
[22] H. Kumar, D. Sarma, and A. Kar, "Security threats in wireless sensor networks," IEEE Aerospace and Electronic Systems Magazine, vol. 23, pp. 39-45, 2008.
[23] T. Xie and X. Qin, “Scheduling security-critical real-time applications on clusters,” IEEE Trans. Comput, vol. 55, no. 7, pp. 864–879, Jul. 2006.
[24] S. Choi, Y. Choi, and I. Lee, "IEEE 802.11 MAC-Level FEC scheme with retransmission combining," IEEE Trans. on Wireless Communications, vol. 5, pp. 203–211, 2006.