• DocumentCode
    2260112
  • Title

    Communications Link Layer Security

  • Author

    Tu, Kwei

  • Author_Institution
    Communications System Consultant, Houston, Texas USA. Ktul@houston.rr.com
  • fYear
    2006
  • fDate
    27-30 Nov. 2006
  • Firstpage
    1
  • Lastpage
    4
  • Abstract
    A highly robust secure protocol is proposed to provide communications link layer security including data source authentication, data integrity, data confidentiality, and replay attack resistance. The protocol is based on shared secret data (SSD) and time codes between two communications entities. The Keyed Hash Message Authentication Code with Secure Hash Algorithm-2 (HMAC-SHA-2) is employed for data source authentication, data integrity and session key generation, while Advanced Encryption Standard (AES) provides the data confidentiality. The Crypto Sync which is already required for encryption/decryption of data in a secure link layer transfer frame operating in cipher feedback mode (CFB) as the initialization vector is also utilized as the Message Authentication Code (MAC) and session key generator and distributor. No additional overhead is required and the link channel bandwidth remains the same. A link layer Consultative Committee on Space Data System (CCSDS) data frame structure is given as the example to illustrate the protocol. The proposed protocol can be applied to any encrypted link layer transfer frame between any two communications entities.
  • Keywords
    codes; cryptographic protocols; data integrity; message authentication; telecommunication security; AES; HMAC-SHA-2; advanced encryption standard; cipher feedback mode; communication link layer security; data confidentiality; data decryption; data encryption; data integrity; data source authentication; initialization vector; keyed hash message authentication code; link channel bandwidth; replay attack resistance; robust secure protocol; secure hash algorithm-2; session key distributor; session key generation; shared secret data; time codes; Access protocols; Communication system security; Cryptography; Data security; Data systems; Feedback; Media Access Protocol; Message authentication; Mobile communication; Wireless LAN;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communication Technology, 2006. ICCT '06. International Conference on
  • Conference_Location
    Guilin
  • Print_ISBN
    1-4244-0800-8
  • Electronic_ISBN
    1-4244-0801-6
  • Type

    conf

  • DOI
    10.1109/ICCT.2006.341721
  • Filename
    4146285