Cross Layer Security
Cross Layer Security
Cross Layer Security
I. I NTRODUCTION
With the rapid growth and development of wireless
networks, determining an appropriate architecture for
the wireless network protocol stack remains an open
challenge. Though layered communication paradigm has
been successful in traditional wired networks, such as
Internet, it poses several limitations in wireless networks.
For instance, in wireless networks, the channel error
at lower layers is often mistaken as congestion at the
network layer resulting in poor TCP throughput [1]. Due
to the varying channel conditions and dynamic network
topology of wireless networks, it is important for the layers to coordinate and adapt to the environmental changes.
Adopting a strictly layered approach in wireless domain
places constraints on network interoperability, exibility
and adaptivity. Co-operation between the layers is thus
necessary to reach higher adaptivity and optimal network
performance. Also, more often in wireless networks,
there is a requirement for autonomous network operation
with minimum human intervention. Design of such selfdependent and decentralized systems requires modications to existing architectural designs. Recent research
efforts indicate that cross-layer design architectures can
efciently address these challenges in wireless networks.
1-4244-1513-06/07/ $25.00 c 2007 IEEE
Cross-layer designs typically combine or extract information from two or more layers of the protocol stack.
Information is shared either between adjacent layers or
non-adjacent layers to create a system with an ease
of adaptability. By interfacing and interacting between
the protocol modules in different layers, we can create
wireless architectures with better holistic views of network goals and constraints. Although several cross-layer
techniques are currently explored for enhancing network
performance, there is limited work on applying them in
the context of wireless security. Our main contribution
in this paper is to investigate the suitability of crosslayer architectures in intrusion detection systems. We
also explore the various cross-layer design restrictions
and study their feasibility in order to build efcient and
reliable intrusion detection systems.
II. C ROSS - LAYER D ESIGN IN W IRELESS N ETWORKS
Varying denitions and classications of cross-layer
design can be found in the recent literature. Srivastava
et al [2], dene cross-layer as a simple violation of
a layered communication architecture. Such violations
may occur in different ways, either by merging adjacent
layers, or by creating new interfaces between adjacent
layers or through a shared database between the layers.
Yuan et al [3] propose a cross-layer adaptation GRACE
to conserve energy and improve QoS in mobile multimedia terminals. GRACE is an adaptation framework
that performs only local adaptation by interfacing system
layers to a central resource manager that acts as a
coordinator. The manager mediates between the layers to
obtain a proper combination of congurations for each
layer to achieve optimal results.
In [4], ECLAIR- a two tier architecture consisting of
Optimization SubSystem (OSS) and Tuning Layers (TL)
is proposed. In this architecture, optimization algorithms
are incorporated into the framework of OSS cross-layer
engine. TL provides user feedback such that the protocol
stack is modied according to user priorities. In [5],
Cross-layer approach to self-healing (CATS) was proposed for sensor networks and battleeld applications.
Authorized licensed use limited to: University of Guelph. Downloaded on March 30, 2009 at 14:50 from IEEE Xplore. Restrictions apply.
CATS introduces a new component called the Management plane which is visible across all layers. This plane
provides all the self healing functions and inuences
protocol behavior such as altering changes to a routing
protocol. The disadvantage of this framework however, is
introducing new protocols and applications, also results
in a change in the underlying framework itself.
MobileMan [6] is another design that identies security, energy management and cooperation as general
objectives that are cross-layer in nature. This architecture
has a central component called the network status that
stores information about all protocols in the network.
The network status acts as an indirect interface between
the layers. The problem with this architecture however
is that it limits the amount of possible protocols running
inside the framework. WIDENS-WIreless DEployable
Network System is a cross-layer project proposed for
public safety, emergency and disaster applications [7].
These cross-layer extensions assume a centralized server,
provide for protocol state interactions and parameter
mapping between the layers.
From the perspective of enhancing network performance, researchers are currently exploring several crosslayer interactions. However there is limited work in
exploring the cross-layer design in the realms of network
security. Zhang et al [8] proposed the idea of a multilayer intrusion detection for wireless ad hoc networks
using a statistical anomaly based detection model. In our
previous work, we have demonstrated a cross-layer based
intrusion defense architecture [9]. We have also analyzed
the specic case of detecting Jamming attacks in wireless
networks using cross-layer techniques [10]. From our
earlier work, we have observed that adopting crosslayer designs for security yields efcient performance
improvement. However, it is also important to study
both their benets and limitations in order to provide
a standardized intrusion detection module for wireless
networks.
A. Exploring the Limitations
Cross-layer methodologies are prone to certain restrictions and limitations according to the nature of their
designs. It is possible that providing interfaces between
the layers might sometimes lead to conicting results on
the network performance. Detailed investigation of these
challenges will provide an insight into the development
of more efcient and reliable cross-layer adaptation
mechanisms. Kawadia et al [11] provide a detailed
analysis of cross-layer design principles and emphasize
the need to exercise strong caution while proposing
such architectural changes. In this section, we examine
Authorized licensed use limited to: University of Guelph. Downloaded on March 30, 2009 at 14:50 from IEEE Xplore. Restrictions apply.
designs, may sometimes present themselves as an impediment to the development of successful architectures. It
is evident that standardized cross-layer adaptation mechanisms are required that can overcome their inherent
challenges and enhance network performance.
Although there is no standard architecture, cross layer
couplings or combinations mostly occur through direct
interaction between the layers or through a structured
method using a shared database [2]. In this work, we
investigate these two cross-layer architectures to assess
their efciency in optimizing network security.
A. Cross-layer IDS based on Direct Per-layer Interactions (Type I)
We have developed a Type I intrusion detection system
for improved detection and better evaluation of malicious
activity in the network. In this type of cross-layer architecture, information is exchanged directly between two
adjacent or non-adjacent layers of the protocol stack,
such that, the layer adaptations result in improved endto-end network performance. Figure 1 gives a schematic
overview of the IDS module.
In this design, every layer in the network protocol
stack collects audit data by actively monitoring the
channel. When an anomaly is detected in a particular
layer using its audit data information, it triggers or
initiates detection at another layer. Such probe based or
event based detection helps in conrming the malicious
behavior of a node. For instance, malicious packet drop
in a network can be observed and detected through
promiscuous network monitoring watchdog schemes.
However, in wireless networks, packet drops can also
Network Protocol Stack
Application Layer
Audit data
Network Layer
Engine
Collection/Trigger
Link Layer
Physical Layer
Fig. 1.
Intrusion Detection
Authorized licensed use limited to: University of Guelph. Downloaded on March 30, 2009 at 14:50 from IEEE Xplore. Restrictions apply.
100
80
60
40
20
0
Fig. 2.
10
80
90
100
80
60
40
20
0
Fig. 3.
20 30 40 50 60 70
Percentage of malicious nodes
10
20 30 40 50 60 70
Percentage of malicious nodes
80
90
Authorized licensed use limited to: University of Guelph. Downloaded on March 30, 2009 at 14:50 from IEEE Xplore. Restrictions apply.
TABLE I
C OMPARISON OF C ROSS - LAYER A RCHITECTURES
Detection
Efciency
Modularity
Stability
Protocol Complexity
Implementation Complexity
Resource
Consumption
900
No Detection
Type-I Detection
800
Throughput (Kbps)
Detection rate
False positives
700
600
500
400
300
200
100
0
Fig. 4.
10
20 30 40 50 60 70
Percentage of malicious nodes
80
Network Layer
Intrusion Detection
Module
Link Layer
Physical Layer
Fig. 5.
Engine
Type I
HIGH
VERY LOW
LOW
LOW
HIGH
HIGH
LOW
Type II
HIGH
LOW
MEDIUM
MEDIUM
LOW
LOW
HIGH
Non Cross-layer
LOW
HIGH
HIGH
HIGH
-
Authorized licensed use limited to: University of Guelph. Downloaded on March 30, 2009 at 14:50 from IEEE Xplore. Restrictions apply.
in overall system optimization. Thus, based on the requirements, we must choose the appropriate design for
intrusion detection system.
V. O PEN C HALLENGES AND F UTURE D IRECTIONS
Research on various cross-layer techniques and
methodologies is still in its incipient stages. Some of
the open challenges associated with cross-layer designs
are:
Can a cross-layer framework designed for optimizing network security be coupled with other crosslayer based network optimizations?
Can we standardize an intrusion detection framework for wireless networks based on the proposed
cross-layer architectures?
Can we have the choice and exibility to invoke
different cross-layer designs based on the threat or
security level in the network?
How to evaluate the fundamental trade-offs between
the network performance and security architecture?
How to determine a common platform to implement
cross-layer design proposals and study their performances using simulations?
Although there is no denitive answer, lack of interoperability between various cross-layer optimization goals is
one of the main problems with various current solutions.
To build an efcient network, it is essential to optimize
different goals simultaneously. Joint optimizations will
provide reliable networks, however, this might complicate the network design to a great extent.
Developing a standardized detection framework for
wireless networks, will improve the accuracy of detecting malicious intrusions. For this, we must rst explore
the possibility of adopting different cross-layer architecture. In this paper, we have provided a performance
comparison between two cross-layer detection systems.
From our results, we can standardize the shared database
model for detecting intrusions. However, if there are
other choices, we should also consider them.
Future research work in cross-layer designs, must
focus on solving the above mentioned challenges. This
will determine the success of cross-layer architectures in
wireless networks.
VI. C ONCLUSION
In this paper, we discussed the cross-layer architectures and examined their benets and limitations
in detail. In particular, we investigated the impact of
cross-layer designs in optimizing network security. We
evaluated an intrusion detection framework using two
different types of cross-layer architectures based on
Authorized licensed use limited to: University of Guelph. Downloaded on March 30, 2009 at 14:50 from IEEE Xplore. Restrictions apply.