Cross-Layer Design for Network Security Enhancement

Cross-Layer Design for Network Security Enhancement

Chi-Yuan Chen (National Dong Hwa University, Taiwan) and Han-Chieh Chao (National Dong Hwa University, Taiwan & National I-Lan University, Taiwan)
Copyright: © 2012 |Pages: 14
DOI: 10.4018/978-1-4666-0960-0.ch006
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

Cross-Layer Design is useful for wireless communication to improve the performance and efficiency. On the other hand, Cross-Layer Design is also helpful in enhancing network security. With the help of cross-layer information and interactions, the security overhead can be reduced and the security efficiency can be improved. In this chapter, the authors review the existing literature and provide a taxonomy based on their methods and applications. According to their survey, these cross-layer security enhancements could be classified into four categories: 1) security protocol; 2) security policy; 3) key management; 4) intrusion detection. The authors hope to attract more applications and research attention in this direction.
Chapter Preview
Top

Background

An important cross-layer design aspect is the management of cross-layer interaction that can guarantee the system operation. Such cross-layer entities (i.e., functions, programs, or protocol layers) may reside within the stack, in which case it is considered as an internal cross-layer entity or an external network node as shown in Figure 1 and Figure 2 (Foukalas, et al., 2008). Internal entity may be either an inter-layer entity that coordinates the operation of all protocol stack layers or an intra-layer entity that is located within a protocol layer. The external entities may be centralized by a specific network node or distributed over several network nodes.

Figure 1.

Internal cross-layer entities

Figure 2.

External cross-layer entities

Complete Chapter List

Search this Book:
Reset