cipher feedback mode under go-back-n and selective- reject...

13
RESEARCH ARTICLE Cipher feedback mode under go-back-N and selective- reject protocols in error channels Xiannuan Liang 1 , Yang Xiao 1 * , Suat Ozdemir 2 , Athanasios V. Vasilakos 3 and Hongmei Deng 4 1 Department of Computer Science, The University of Alabama, 101 Houser Hall, Tuscaloosa, AL 35487-0290, U.S.A. 2 Computer Engineering Department, Gazi University Maltepe, Ankara TR-06570, Turkey 3 Department of Computer and Telecommunications Engineering, University of Western Macedonia, Greece 4 Intelligent Automation, Inc., 15400 Calhoun Dr. Suite 400, Rockville, MD 20855, U.S.A. ABSTRACT To produce ciphertexts, two modes of encryption are appliedblock ciphers, which encrypt a xed size block of plaintext at a time, and stream ciphers, which encrypt stream data, one or more bits at a time. As one of stream ciphers, the cipher feedback (CFB) mode is implemented by a block cipher via multiple stages, and in each stage, 1bit or a number of bits of plaintext are encrypted at a time. Throughout this paper, the study will focus upon the error performance of the stream-based CFB under two sliding-window protocols, go-back-N and selective-reject, in an error channel in terms of throughput. We model the performance of the CFB in terms of application-level throughput and derive the number of stages needed to achieve the optimal throughput, under a given error rate in an error channel. Copyright © 2012 John Wiley & Sons, Ltd. KEYWORDS cipher feedback mode; ow control; sliding-window; error channel *Correspondence Yang Xiao, Department of Computer Science, The University of Alabama, 101 Houser Hall, Tuscaloosa, AL 35487-0290, U.S.A. E-mail: [email protected] 1. INTRODUCTION Throughout the work, there is a collective study of the performance of a stream cipher mode called cipher feed- back (CFB) mode [1,2] with the link control mechanismssliding-window protocols [3] including go-back-N ARQ (automatic repeat-request) and selective-reject ARQ. Stream ciphers are used to encrypt one or more bits/bytes at a time and normally generate a keystream XORed with the plaintext to generate the ciphertext. To decrypt the ciphertext, the plaintext is recovered at the receiver by generating the same keystream. There have been many stream ciphers in wireless networks (e.g., IEEE 802.11 [4] and voice encryption in wireless telephones [5,6]). Telnet adopts CFB [7,2]. Poten- tially, CFB can be applied in wireless networks (e.g., in Telnet over wireless networks or voice encryption in wireless telephones/messaging). In [8,7], with CFB and under the stop-and-wait link protocol [3], the authors provided an error analysis for the CFB in a wireless error channel and analytically model the throughput as well as the probability that a portion or absolutely the complete ciphertext may not be successfully decrypted by the CFB. However, stop-and-wait is the simplest of the three common protocols used for ow and error control at the link level. The other common protocols are go-back-N and selective-reject [3]. Throughout this work, we focus on studying the perfor- mance and impact of the CFB under the sliding-window protocols go-back-N and selective-reject. According to the authorsknowledge, there is no work on the CFB with go- back-N and selective-reject in the literature. The work is the rst attempt at studying the CFB under the sliding-window protocols. Coupled with the CFB, the performance analyses of go-back-N and selective-reject are much more complicated than those of the simple stop-and-wait protocol used in [8,7]. Now, we focus on solving this problem: under go-back-N and selective-reject, given a bit error rate in an error channel and the number of bits encrypted each time, how many stages are needed to obtain the optimal throughput? The results presented in this paper should help to select values for the parameters of the CFB when used with sliding-window protocols in error channels. First, the channel throughput is evaluated as a function of the channel parameters of bit error rate, the CFB parameters, and the specic protocol used (go-back-N or selective-reject). The problem of maximizing the channel throughput with respect to the CFB parameters is then analyzed, and the results are supported by performance evaluation. Note that an early short version of this paper was presented in a conference [9]. There are also some related papers in [1051]. The rest of the paper is organized as follows: In Section 2, we briey introduce sliding-window protocols including both go-back-N and selective-reject. In Section 3, we introduce the SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2013; 6:942954 Published online 12 October 2012 in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/sec.638 Copyright © 2012 John Wiley & Sons, Ltd. 942

Upload: others

Post on 24-Oct-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

  • SECURITY AND COMMUNICATION NETWORKSSecurity Comm. Networks 2013; 6:942–954

    Published online 12 October 2012 in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/sec.638

    RESEARCH ARTICLE

    Cipher feedback mode under go-back-N and selective-reject protocols in error channelsXiannuan Liang1, Yang Xiao1*, Suat Ozdemir2, Athanasios V. Vasilakos3 and Hongmei Deng4

    1 Department of Computer Science, The University of Alabama, 101 Houser Hall, Tuscaloosa, AL 35487-0290, U.S.A.2 Computer Engineering Department, Gazi University Maltepe, Ankara TR-06570, Turkey3 Department of Computer and Telecommunications Engineering, University of Western Macedonia, Greece4 Intelligent Automation, Inc., 15400 Calhoun Dr. Suite 400, Rockville, MD 20855, U.S.A.

    ABSTRACT

    To produce ciphertexts, two modes of encryption are applied—block ciphers, which encrypt a fixed size block of plaintextat a time, and stream ciphers, which encrypt stream data, one or more bits at a time. As one of stream ciphers, the cipherfeedback (CFB) mode is implemented by a block cipher via multiple stages, and in each stage, 1 bit or a number of bits ofplaintext are encrypted at a time. Throughout this paper, the study will focus upon the error performance of the stream-basedCFB under two sliding-window protocols, go-back-N and selective-reject, in an error channel in terms of throughput.Wemodelthe performance of the CFB in terms of application-level throughput and derive the number of stages needed to achieve theoptimal throughput, under a given error rate in an error channel. Copyright © 2012 John Wiley & Sons, Ltd.

    KEYWORDS

    cipher feedback mode; flow control; sliding-window; error channel

    *Correspondence

    Yang Xiao, Department of Computer Science, The University of Alabama, 101 Houser Hall, Tuscaloosa, AL 35487-0290, U.S.A.E-mail: [email protected]

    1. INTRODUCTION

    Throughout the work, there is a collective study of theperformance of a stream cipher mode called cipher feed-back (CFB) mode [1,2] with the link control mechanisms’sliding-window protocols [3] including go-back-N ARQ(automatic repeat-request) and selective-reject ARQ.Stream ciphers are used to encrypt one or more bits/bytesat a time and normally generate a keystream XORed withthe plaintext to generate the ciphertext. To decrypt theciphertext, the plaintext is recovered at the receiver bygenerating the same keystream.

    There have been many stream ciphers in wirelessnetworks (e.g., IEEE 802.11 [4] and voice encryption inwireless telephones [5,6]). Telnet adopts CFB [7,2]. Poten-tially, CFB can be applied in wireless networks (e.g., inTelnet over wireless networks or voice encryption inwireless telephones/messaging).

    In [8,7], with CFB and under the stop-and-wait linkprotocol [3], the authors provided an error analysis forthe CFB in a wireless error channel and analytically modelthe throughput as well as the probability that a portion orabsolutely the complete ciphertext may not be successfullydecrypted by the CFB. However, stop-and-wait is thesimplest of the three common protocols used for flow anderror control at the link level. The other common protocolsare go-back-N and selective-reject [3].

    942

    Throughout this work, we focus on studying the perfor-mance and impact of the CFB under the sliding-windowprotocols go-back-N and selective-reject. According to theauthors’ knowledge, there is no work on the CFB with go-back-N and selective-reject in the literature. The work is thefirst attempt at studying the CFB under the sliding-windowprotocols. Coupled with the CFB, the performance analysesof go-back-N and selective-reject are much more complicatedthan those of the simple stop-and-wait protocol used in [8,7].Now, we focus on solving this problem: under go-back-Nand selective-reject, given a bit error rate in an error channeland the number of bits encrypted each time, how many stagesare needed to obtain the optimal throughput? The resultspresented in this paper should help to select values for theparameters of the CFB when used with sliding-windowprotocols in error channels. First, the channel throughput isevaluated as a function of the channel parameters of biterror rate, the CFB parameters, and the specific protocol used(go-back-N or selective-reject). The problem of maximizingthe channel throughput with respect to the CFB parametersis then analyzed, and the results are supported by performanceevaluation. Note that an early short version of this paper waspresented in a conference [9]. There are also some relatedpapers in [10–51].

    The rest of the paper is organized as follows: In Section 2,we briefly introduce sliding-window protocols including bothgo-back-N and selective-reject. In Section 3, we introduce the

    Copyright © 2012 John Wiley & Sons, Ltd.

  • Cipher feedback mode under go-back-N and selective-rejectX. Liang et al.

    CFB. In Section 4, we provide a throughput analysis ofgo-back-N and selective-reject. In Section 5, we provide anoptimality analysis of go-back-N and an optimality analysisof selective-reject. In Section 6, we evaluate the performance;we conclude this paper in Section 7.

    2. BRIEF INTRODUCTION TOSLIDING-WINDOW PROTOCOLS

    Three techniques that are commonly used for flow anderror control at the link level are stop-and-wait, go-back-N,and selective-reject. The final two techniques are specialcases of the sliding-window techniques.

    2.1. Stop-and-wait

    Stop-and-wait flow control [3] is simplest form of flowcontrol. In stop-and-wait, a source station transmits a frameonce. After reception, the destination station sends back anacknowledgment frame for the frame it has just received,thus indicating that it is ready to accept another frame.Before the source station receives the acknowledgmentframe, it must wait to send the next frame.

    The problem with stop-and-wait is that if the bit lengthof the link is greater than the frame length, then seriousinefficiencies will occur, where the bit length of the linkis defined as the time it takes one bit to travel from thebeginning of the link to the end, that is, propagation delay,and the frame length is the time it takes to transmit a frame,that is, transmission time.

    2.2. Sliding-window

    Allowing two or more frames to be transmitted at a timemay greatly reduce inefficiency.

    Consider two stations, a source and a destination, whichare connected with a full-duplex link [3]. The destinationallocates buffer space for n frames and, thus, may acceptn frames. The source is allowed to send up to n frameswithout waiting for an acknowledgment frame (ACK).The scheme can be used to acknowledge multiple frames.For example, the destination could receive frames denotedas 1, 2, and 3, but would not send an ACK until frame 3has arrived. By returning an ACK with the sequencenumber of frame 4, the destination acknowledges frames1, 2, and 3 at one time by indicating that it is ready toreceive frame 4. The source maintains a list of sequencenumbers that it is allowed to send, and the destination getsa queue of sequence numbers that it is ready to receive.Each of these lists can be considered to be a windowof frames, and the operation is called therefore as sliding-window flow control.

    Go-back-N ARQ [3] is the most commonly used formof error control based on sliding-window flow control. Ingo-back-N ARQ, a source may sequentially send a seriesof frames numbered modulo some maximum value. Thenumber of outstanding, unacknowledged frames depends

    Security Comm. Networks 2013; 6:942–954 © 2012 John Wiley & Sons, Ltd.DOI: 10.1002/sec

    on the window size. If no errors occur, the destination willacknowledge incoming frames as usual. If the destinationdetects any error in a frame, it will send a negative ACKand get rid of that frame and all future incoming framesuntil the frame in error is correctly received. After receiv-ing a negative ACK, the source will retransmit the framein error as well as all succeeding frames that were transmit-ted in the interim.

    In selective-reject [3], if an error occurs, the source onlyretransmits the frames that either receives a negative ACK,or those in the case of time out. Selective-reject appears tobe more efficient than go-back-N in terms of minimizingthe number of retransmissions, but the destination mustmaintain a buffer large enough to save frames until theframe in error arrives and is reinserted in the proper se-quence. The source also requires more complex logic tohandle the cases in which a frame is sent out of sequence.In other words, go-back-N is simpler than selective-reject.Because of such complications, selective-reject is muchless widely used than go-back-N.

    3. CIPHER FEEDBACK MODE

    The CFB mode [8,7,52,1] is one mechanism used by ablock cipher to implement a stream cipher. A stream cipheris one that encrypts a stream of data, such as voice, video,or Telnet traffic, one bit/byte at a time. The autokeyedVigenere cipher and the Vernam cipher are two examplesof stream ciphers. CFB was originally derived from blockciphers, such as the Data Encryption Standard (DES)[8,7,52,1,53,2]. However, CFB is not limited to the DESand can be used with the Advanced Encryption Standard,Triple DES, Skipjack, and so on. In the CFB mode, aplaintext (P) is divided into M units P=P1||P2||P3||. . .||PMand each unit has s bits (s = 1, 2, . . ., 64). Thecorresponding ciphertext is denoted as C=C1||C2||C3||. . .||CM. For j = 1, . . .,M, the encryption is done by Cj=F(DESK(Hj))�Pj and H1 = IV, where Hj =L-Shift(Hj� 1,s)Cj� 1, IV is an initialization vector of length L (L=64),F denotes the function of obtaining the (left) most signifi-cant s bits, DESK() denotes the encryption of the DESusing the key K, and L-Shift(H, s) denotes the function ofleft shifting H with s shifts such that the (left) most signif-icant s bits are discarded. For j = 1, . . .,M, the decryption isdone by Pj=F(DESK(Hj))�Cj. The following subsectionsgive more details about CFB encryption and decryption.

    3.1. Encryption

    In the CFB mode, a plaintext (P) is divided into M unitsP=P1||P2||P3||. . .||PM, and each unit has s bits (s=1,2, . . ., 64), as shown in Figure 1a. In other words, s bits of dataare encrypted at a time. An IV of length L (L=64 in Figure 1)is used as the initial input block of the DES encryption forP1, and the (left) most significant s bits of the output blockof the DES encryption are XORed with the s-bit plaintextunit P1 to produce the cipher text C1. Let F denote the

    943

  • Shift Register 64-s bits s bits

    Encrypt

    Select Discards bits 64-s bits

    64

    64

    K

    s

    s

    C1

    P1

    Shift Register 64-s bits s bits

    Encrypt

    Select Discards bits 64-s bits

    64

    64

    K

    s

    s

    C2

    P2

    Shift Register 64-s bits s bits

    Encrypt

    Select Discards bits 64-s bits

    64

    64

    K

    s

    s

    CM

    PM

    CM-1

    (a) Encryption Procedure of the CFM Mode

    Shift Register 64-s bits s bits

    Encrypt

    Select Discards bits 64-s bits

    64

    64

    K

    s

    s C1

    P1

    Shift Register 64-s bits s bits

    Encrypt

    Select Discards bits 64-s bits

    64

    64

    K

    s

    sC2

    P2

    Shift Register 64-s bits s bits

    Encrypt

    Select Discards bits 64-s bits

    64

    64

    K

    s

    s CM

    PM

    CM-1

    (b) Decryption Procedure of the CFM Mode

    IV

    IV

    Figure 1. The cipher feedback mode (CFM).

    Cipher feedback mode under go-back-N and selective-reject X. Liang et al.

    function of obtaining the (left) most significant s bits, and letK denote the key of DES. We have C1 =F(DESK(IV))�P1.

    Generally, the initial input block is IV, and then the inputblock, referred to as the shift register, changes each time. Theinput block Hj (j=1, . . .,M) is encrypted with DES, and anoutput block is produced. The (left) most significant s bitsof the output block of the DES encryption are XORed withthe s-bit plaintext unit Pj. For j=1, . . .,M, we have

    Cj ¼ F DES Hj� �� ��Pj (1)

    H1 ¼ IV (2)

    In Equation (1), we notice that the unused 64� s bits ofthe DES output block are discarded. The next input blockis created by discarding the (left) most significant s bits ofthe previous input block, shifting the remaining bits 64� spositions to the left, and then inserting the s bits of cipher textjust produced in the encryption operation. Let L-Shift(H, s)denote the function of left shifting H with s shifts such thatthe (left) most significant s bits are discarded. For j = 2, . . .,M, we have

    944 Sec

    Hj ¼ L-Shift Hj�1; s� ��Cj�1 (3)

    This process continues until the entire plain text message(P) has been encrypted.

    3.2. Decryption

    Decryption is shown in Figure 1b, in which s bits of dataare decrypted at a time. The initial input block is the sameas the encryption listed in Equations (2) and (3). The DESencryption is still used to encrypt the input block Hj ( j = 1,,M) to generate the output block. The (left) most signifi-cant s bits of the output bock of the DES encryption areXORed with the s-bit ciphertext unit Cj to produce theplaintext block Pj. Therefore, for j = 1, . . .,M, we have

    Pj ¼ F DESK Hj� �� ��Cj (4)

    We can easily prove Equation (4) as follows.

    F DESK Hj� �� ��Cj ¼ F DESK Hj� �� �� F DESK Hj� �� ��Pj� � ¼ Pj

    urity Comm. Networks 2013; 6:942–954 © 2012 John Wiley & Sons, Ltd.DOI: 10.1002/sec

  • Cipher feedback mode under go-back-N and selective-rejectX. Liang et al.

    In Equation (4), we notice that the unused 64� s bits ofthe DES output block are discarded. The subsequentinput block is created by discarding the (left) mostsignificant s bits of the previous input block, shifting theremaining bits 64� s positions to the left, and theninserting the s bits of cipher text just produced in theencryption operation.This process continues until theentire cipher text message (C =C1||C2||C3||. . .||CM) hasbeen decrypted.

    3.3. Discussion

    With encryption and decryption of the CFB mode, we maynotice that the CFB mode is an implementation of a streamcipher with a block cipher. A stream cipher is useful forstream data.

    Note that in both encryption and decryption of theCFB mode in Figure 1, the DES encryption is used, butnot the DES decryption. In fact, the DES is used toencrypt the input block so that different s-bit outputs areproduced.

    4. THROUGHPUT STUDY OFSLIDING-WINDOW PROTOCOLS

    In this part, we will study both the normalized link-levelthroughput and the normalized application-level throughputof transmissions under sliding-window protocols.

    Table I. No

    T Link-level throughputG Application-level throughputTr The time from the beginning of the transmission o

    Ttrans The transmission time of a frameTprop Propagation delayTdata The transmission time of the application-level dataTt_ack The transmission time of an acknowledgmenta Tprop/Ttransb Tt_ack/TtransP The probability that there is an error occurring in th

    frame itself or in the acknowledgment)s The volume in bits of cipher text outputted at theM The number of stages in a CFB encryption

    Mopt The number of stage(s) for encryption/decryption wwithout considering the capacity of application-lev

    �Mopt The optimal number of stages for encryption/decrydata in frame

    R The transmission rate in bits per secondH The frame/packet overhead in bits including heade

    and trailerLACK The length of the acknowledgment frame/packet iTp The transmission time for the physical header

    RBER The channel bit error rateW The number of frames in a windowI(e) The indication function, which returns 1 if e is true

    Security Comm. Networks 2013; 6:942–954 © 2012 John Wiley & Sons, Ltd.DOI: 10.1002/sec

    4.1. Application scenarios

    For sliding-window flow and error control protocol, it isnatural to assume that there is a full-duplex channel (path)with one source and one destination. The full-duplex chan-nel can be a multiple-hop path if the connection betweenthe source and the destination has an end-to-end flow anderror control; the examples of multiple-hop path are TCPchannels and paths over frame relay or AsynchronousTransfer Mode (ATM) networks for transmissions withno flow control in upper layer (such as User DatagramProtocol (UDP) transmission). The full-duplex channelcan also be a one-hop path if the connection is over a net-work using a hop-by-hop flow control such as X.25 andsome kinds of LANs. Application scenarios over sliding-window flow control include UDP transmission overX.25, ATM or frame relay networks, TCP transmissions,and more.

    Before we study the performance of CFB under thesliding-window protocols, we need to first define or denotethe quantities and variables involved in Sections 4 and 5.Besides that, we also put the notations of the quantitiesand variables in Table I. Let T and G denote normalizedlink-level throughput [3] and normalized application-levelthroughput (goodput) [54], respectively. Let P denote theprobability that an error occurs when a frame is transmit-ted. Let a denote the ratio of the propagation delay to thetransmission time of a frame, that is, a=Tprop/Ttrans, whereTtrans is the transmission time and Tprop is propagationdelay. Let Tdata denote the transmission time of the

    tations.

    f a frame to the reception of the acknowledgment

    in a frame

    e transmission of a frame (error either in the

    end of each stage of a CFB encryption

    hich leads to the optimal application-level throughputel data in a frameption in consideration of the capacity of application-level

    r (Medium Access Control header, IP header, TCP/UDP header)

    n bits

    and 0 if it is not

    945

    HYPERLINK http://en.wikipedia.org/wiki/Asynchronous_Transfer_ModeHYPERLINK http://en.wikipedia.org/wiki/Asynchronous_Transfer_Mode

  • G

    Cipher feedback mode under go-back-N and selective-reject X. Liang et al.

    application-level data in a frame. LetW denote the windowsize, that is, the maximum number of frames that can bebuffered. When the source transmits a frame, it takestime for the source to receive an acknowledgment (ACK)from the destination. Let Tr denote the time from thebeginning of the transmission of the frame to the receptionof the acknowledgment. Let I(e) denote the indicationfunction, which returns 1 if e is true and 0 if it is not. Notethat from the definitions of normalized throughput (linklevel) in [3] and normalized goodput in [54], the followingexpression holds:

    G ¼ TdataTtrans

    �T;

    4.2. Error-free sliding-window flow control

    The link-level throughput for a sliding-window flowcontrol under an error-free channel was given asfollows [3]:

    T ¼ I W≥2aþ 1ð Þ þWI W < 2aþ 1ð Þ= 2aþ 1ð Þ (5)

    However, in [3], the author ignored transmission timeof an ACK by assuming Tr = Ttrans + 2Tprop. We want toconsider ACKs as follows. Let Tt_ack denote the transmis-sion time for the ACK. We have Tr = Ttrans + 2Tprop Tt_ack.Let b= Tt_ack/Ttrans denote the ratio of the transmissiontime of an ACK to the transmission time of a frame. Thus,if we do not ignore the transmission time of the ACK, theexpression of the throughput without error is

    T ¼ I W≥ Ttrans þ 2Tprop þ Tt�ackTtrans

    � �þ WTtransTtrans þ 2Tprop þ Tt�ack

    I W<Ttransþ 2Tpropþ Tt�ack

    Ttrans

    � �¼ I W≥1þ 2aþ bð Þ þ W

    1þ 2aþ bð Þ I W < 1þ 2aþ bð Þ

    (6)

    4.3. Sliding-window flow control with error

    During the transmission of frames, an error occurs if thereis either a damaged frame or a damaged ACK. In [3], theauthor deducted expressions of the normalized throughputin the cases go-back-N and selective-reject under thepossibility of those errors. In the following, we will revisethose throughput expressions from [3] in consideration ofthe transmission time of an acknowledgment, which wasignored in the throughput deduction in [3]. Note that theresults in [3] are about link-level throughput and is basedon the assumption that the propagation delay is stableand has nothing to do with the frame size. This assumptionis true in a one-hop channel. In a multiple-hop channelsuch as ATM channel, it is realistic that the propagationdelay is assumed to be stable and have nothing to do withthe frame size because of high data transmission rate and

    946 Sec

    small data payload in a frame. Generally speaking, in amultiple-hop channel such as TCP, applying that assump-tion is a way to make the study less complicated and moretractable. In the study throughout this paper, we hold thatassumption.

    4.3.1. Go-back-NFrom [3], with go-back-N, we obtain the following

    expression:

    T ¼ 1� P1� Pþ 2aþ 1ð ÞP I W≥2aþ 1ð Þ

    þ W2aþ 1ð Þ �

    1� Pð Þ1� PþWPð Þ I W < 2aþ 1ð Þ

    (7)

    However, in Equation (7), the author ignores thetransmission time of an acknowledgment. Consideringthe transmission time of an acknowledgment, the afore-mentioned expression can be modified as follows:

    T ¼ 1� P1� Pþ TrPð Þ=Ttrans I W≥

    TrTtrans

    � �þ WTr=Ttrans

    � 1� Pð Þ1� PþWPð Þ I W <

    TrTtrans

    � � (8)

    Note that the normalized throughput T in Equation (8)is not an application-level throughput but link-levelthroughput. To convert the normalized throughput tonormalize application-level throughput (goodput) G, wehave the following expression:

    ¼ TdataTtrans

    �T ¼ TdataTtrans

    � 1� P1� Pþ TrPð Þ=Ttrans I W≥

    TrTtrans

    � �þ TdataW

    Tr� 1� Pð Þ1� PþWPð Þ I W <

    TrTtrans

    � �(9)

    4.3.2. Selective-rejectFrom [3], with selective-reject, we obtain the following

    expression:

    T ¼ 1� Pð ÞI W≥2aþ 1ð Þ þW 1� Pð Þ2aþ 1 I W < 2aþ 1ð Þ

    (10)

    Similar to the discussion of go-back-N, if we do notignore the transmission time of acknowledgments, theaforementioned expression should be modified to

    T¼ 1� Pð ÞI W≥ TrTtrans

    � �þ TtransW 1� Pð Þ

    TrI W <

    TrTtrans

    � �(11)

    Similar to the case in go-back-N, the normalized goodputG has the following expression:

    urity Comm. Networks 2013; 6:942–954 © 2012 John Wiley & Sons, Ltd.DOI: 10.1002/sec

  • Cipher feedback mode under go-back-N and selective-rejectX. Liang et al.

    G ¼ TdataTtrans

    �T ¼ TdataTtrans

    � 1� Pð ÞI W≥ TrTtrans

    � �

    þTdataW 1� Pð ÞTr

    I W <Tr

    Ttrans

    � � (12)

    Expressions (9) and (12) are two segment functions withthe value of depending on whether W < TrTtrans or not.

    5. OPTIMAL STUDY

    With CFB encryption/decryption and sliding-window flowand error control, both the data security and efficiency canbe supported in data transportation and communication.Data encryption/decryption can be applied in differentlevels of communication from application level to linklevel [55]. In this section, we will study the optimalnumber of stages of CFB encryption under sliding-windowprotocols and the optimal throughput that can be reachedunder the assumption that the data encrypted isapplication-level data; this indicates that our deductionis to maximize the application-level throughput G.Actually, if data encryption happens in the lower leveland the goal is to maximize throughput on lower level,the deduction process is same as the one in this sectionwith minor changes of the values of the headers. ForCFB to maximize the application-level throughput, it iscrucial to find out the optimal payload D (in bits) ofencrypted data in a frame, which leads to maximumthroughput. It is natural to consider that the optimal CFBencryption method is to encrypt D bits of plain text atone encryption (one encryption can consist of multiplestages) because that will save the effort to segment orcombine the encrypted texts to fit the optimal payload D.Then, given the volume s of the outputted cipher data ineach stage of encryption, we know that D = s �Mopt whereMopt is the optimal number of stages in an encryption,defined as follows.

    Let R, H, LACK, Tp, RBER, andW denote the transmissionrate in bps (bits per second), the frame/packet overhead inbits including header (Medium Access Control header, IPheader, TCP/UDP header) and trailer, the length of the ac-knowledgment frame/packet in bits, the transmission timefor the physical header, the channel bit error rate, and thenumber of frames in a window, respectively. Let M, s,and Mopt denote the number of stages of encryption/de-cryption in the CFB mode, the number of bits in the plain-text to be encrypted/decrypted, and the number of stage(s)for encryption/decryption, which lead to the optimalthroughput, respectively.

    We have

    1� P ¼ O1 1� RBERð ÞsM (13)

    O1 ¼ 1� RBERð ÞHþLACK (14)

    Security Comm. Networks 2013; 6:942–954 © 2012 John Wiley & Sons, Ltd.DOI: 10.1002/sec

    Tr ¼ sM=Rþ sO2=R (15)

    Ttrans ¼ sM=Rþ H=Rþ Tp (16)

    Tdata ¼ sM=R (17)

    TrTtrans

    ¼ sM=Rþ sO2=RsM=Rþ H=Rþ Tp ¼

    M þ O2M þ H þ TpR

    � �=s

    (18)

    O2 ¼ H þ LACK þ 2RTp þ 2RTprops (19)

    Here, O1 and O2 are two intermediate variables that canmake the denotations more concise.

    Then, by substituting the aforementioned two expres-sions about P and Tr/Ttrans into Equations (9) and (12),we can obtain the expression of the normalized throughputin selective-reject and that in go-back-N in the followingsubsections.

    5.1. Selective-reject

    By substituting Equations (13)–(19) to Equation (12), wecan obtain

    G ¼ MO1 1� RBERð ÞsM

    M þ H þ TpR� �

    =sI W≥

    M þ O2M þ H þ TpR

    � �=s

    !

    þMWO1 1� RBERð ÞsM

    M þ O2 I W <M þ O2

    M þ H þ TpR� �

    =s

    !(20)

    From Equation (20), if we fix M, we should obtain thefollowing expression:

    G ¼ G1I M≥O2 �W H þ TpR

    � �=s

    W � 1� �

    þG2I 0 < M <O2 �W H þ TpR

    � �=s

    W � 1� � (21)

    where

    G1 ¼ MO1 1� RBERð ÞsM

    M þ H þ TpR� �

    =s

    and

    G2 ¼ MWO1 1� RBERð ÞsM

    M þ O2

    Also, when M ¼ O2�W HþTpRð Þ=sW�1 , we have G1 =G2.

    947

  • s

    �=s

    Cipher feedback mode under go-back-N and selective-reject X. Liang et al.

    From Equation (21), when M >O2�W HþTpRð Þ=s

    W�1 ,

    dG

    dM¼ dG1

    dM

    ¼ O1 1� RBERð ÞsMþM 1� RBERð ÞsM ln 1� RBERð Þs

    � �M þ H þ TpR

    � �=s

    � �2� M þ H þ TpR

    � �=s

    � �� O1M 1� RBERð ÞsMM þ H þ TpR

    � �=s

    � �2¼ O1

    M þ H þ TpR� �

    =s� �2

    �½ H þ TpR� �

    =s� �

    1� RBERð ÞsM

    þ M þ H þ TpR� �

    =s� �

    M 1� RBERð ÞsM ln 1� RBERð Þs�

    ¼ O1 1� RBERð ÞsM

    M þ H þ TpR� �

    =s� �2

    � H þ TpR� �

    =sþ M þ H þ TpR� �

    =s� �

    M ln 1� RBERð Þs� �

    and also from Equation (21), when 0 < M <O2�W HþTpRð Þ=s

    W�1 ,

    dG

    dM¼ dG2

    dM

    ¼ WO1 1� RBERð ÞsM þM 1� RBERð ÞsM ln 1� RBERð Þs

    � �M þ O2ð Þ2

    � M þ O2ð Þ �WO1M 1� RBERð ÞsM

    M þ O2ð Þ2¼ WO1

    M þ O2ð Þ2

    � O2 1� RBERð ÞsMþ M þ O2ð ÞM 1� RBERð ÞsM ln 1� RBERð Þs� �

    ¼ WO1 1� RBERð ÞsM O2 þ M þ O2ð ÞM ln 1� RBERð Þs½ �

    M þ O2ð Þ2

    Define L2(M) = (H+TpR)/s+ (M+ (H+TpR)/s)M ln(1�RBER)

    s and L1(M) =O2 + (M+O2)M ln(1�RBER)s. Then,L1 and L2 are both a monotone decreasing function of Mwhen M> 0. Note that we know that

    dG

    dM¼

    dG1dM

    ¼ O1 1� RBERð ÞsML2 Mð Þ

    M þ H þ TpR� �

    =s� �2 if M > O2 �W H þ TpR

    � �=

    W � 1

    dG2dM

    ¼ WO1 1� RBERð ÞsML1 Mð Þ

    M þ O2ð Þ2if 0>>>>>>>>:(22)

    From Equation (22), the signs of dG1dM anddG2dM are the

    same as those of L2(M) and L1(M), respectively. From the

    discussion of stop-and-wait in [8,7], we know that M1 ¼�O2 ln 1�RBERð Þs�

    ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiO2 ln 1�RBERð Þs½ �2�4O2 ln 1�RBERð Þs

    p2 ln 1�RBERð Þs and M2 ¼

    � HþTpRð Þ=sð Þ ln 1�RBERð Þs�ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi

    HþTpRð Þ=sð Þ ln 1�RBERð Þs½ �2�4 HþTpRð Þ=sð Þ ln 1�RBERð Þsq

    2 ln 1�RBERð Þs

    are the solutions to the formula L1 =0 and L2 = 0, respec-tively. Because of the decreasing quality of L1(M) and L2(M), and the fact that dG1dM and

    dG2dM have the same signs as

    L2 and L1, respectively, we know that

    948 Sec

    dG1dM

    < 0 when M > M2

    dG1dM

    > 0 when M > M2

    dG2dM

    < 0 when M > M1

    dG2dM

    > 0 when M < M1

    8>>>>>>>>>>>>>>>>>>>>>>>>>:(23)

    Note that f xð Þ ¼ �x ln 1�RBERð Þs�ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffix ln 1�RBERð Þs½ �2�4x ln 1�RBERð Þs

    p2 ln 1�RBERð Þs

    is a monotone increasing function of 0< xM2 because O2> (H+TpR)/s.

    From Equations (21) and (23), and the fact thatM2>M1,

    Mopt ¼ M2IO2 �W H þ TpR

    � �=s

    W � 1 ≤M2� �

    þO2 �W H þ TpR� �

    =s

    W � 1 I M2 <O2 �W H þ TpR

    � �=s

    W � 1 ≤M1� �

    þM1IO2 �W H þ TpR

    � �=s

    W � 1 > M1� �

    If we consider the case of the limit of the frame size in alink, then the optimal stage applied (denote by �Mopt ) can beexpressed as

    �Mopt ¼ min Mopt ;Pmax=s

    where Pmax is capacity of application-level data in bitscarried in a frame.

    5.2. Go-back-N

    By substituting Equations (13)–(19) to Equation (9), wecan obtain

    G ¼ MO1 1� RBERð ÞsM

    Mþ HþTpR� �

    =s� �

    O1 1�RBERð ÞsMþ 1� O1 1�RBERð ÞsM� �

    MþO2ð Þ

    �I W≥ M þ O2M þ H þ TpR

    � �=s

    !

    þ MWO1 1� RBERð ÞsM

    M þ O2ð Þ O1 1� RBERð ÞsM þW �WO1 1� RBERð ÞsM� �

    �I 0 < W < M þ O2M þ H þ TpR

    � �=s

    !(24)

    If W is fixed, we can obtain the following expression:

    G ¼ F1I M≥O2 �W H þ TpR

    � �=s

    W � 1� �

    þF2I 0 < M <O2 �W H þ TpR

    � �=s

    W � 1� � (25)

    where

    urity Comm. Networks 2013; 6:942–954 © 2012 John Wiley & Sons, Ltd.DOI: 10.1002/sec

  • Cipher feedback mode under go-back-N and selective-rejectX. Liang et al.

    F1 ¼ MO1 1� RBERð ÞsM

    Mþ HþTpR� �

    =s� �

    O1 1�RBERð ÞsMþ 1�O1 1� RBERð ÞsM� �

    MþO2ð Þ

    (26)and

    F2 ¼ MWO1 1� RBERð ÞsM

    M þ O2ð Þ O1 1� RBERð ÞsM þW �WO1 1� RBERð ÞsM� �

    (27)

    Note that F1 =F2 when M ¼ O2�W HþTpRð Þ=sW�1 .From Equations (25) and (26), when 0 < M <

    O2�W HþTpRð Þ=sW�1 , we obtain

    dG

    dM¼ dF2

    dM

    ¼ WO1M þ O2ð Þ2 O1 1� RBERð ÞsM þW �WO1 1� RBERð ÞsM

    � �2�½WM2 ln 1� RBERð Þs þWO2M ln 1� RBERð Þs

    þO1O2 1�Wð Þ 1� RBERð ÞsM þ O2W � (28)

    Define

    limM!1

    dF2dM

    ¼ limM!þ1

    WO1

    M þ O2ð Þ2 O1 1� RBERð ÞsM þW �WO1 1� RBERð ÞsM� �2

    �½WM2 ln 1� RBERð Þs þWO2M ln 1� RBERð Þs

    þ O1O2 1�Wð Þ 1� RBERð ÞsM þ O2W �¼ O1 ln 1� RBERð Þs < 0

    (33)

    K1 Mð Þ ¼ WM2 ln 1� RBERð Þ2

    þWO2M ln 1� RBERð Þ2

    þO1O2 1�Wð Þ 1� RBERð ÞsM þ O2W

    (29)

    From Equations (28) and (29), the sign of dF2dM is the sameas K1(M).

    We can further prove as follows that the expression dF2dM ¼WO1 WM2 ln 1�RBERð ÞsþWO2M ln 1�RBERð ÞsþO1O2 1�Wð Þ 1�RBERð ÞsMþO2W½ �

    MþO2ð Þ2 O1 1�RBERð ÞsMþW�WO1 1�RBERð ÞsM½ �2 ¼ 0has a solution in 0 0;

    (32)and

    Then, from Equations (32) and (33), the equation ofdF2dM ¼ 0 must have a solution in 0 0; when M < S1

    �(34)

    From Equation (34), S1 is the unique solution ofdF2dM ¼ 0.

    When M >O2�W HþTpRð Þ=s

    W�1 , we can obtain

    1� RBERÞsM þ M þ O2ð ÞM ln 1� RBERð Þs�

    ERÞsM þ 1� O1 1� RBERð ÞsM� �

    M þ O2ð Þ�2 (35)

    949

  • Cipher feedback mode under go-back-N and selective-reject X. Liang et al.

    From Equation (35), it can be deducted that

    dF1dM

    M¼0 ¼O1 1� O1ð ÞO2 þ H þ TpR

    � �=s

    � �O1

    � �H þ TpR� �

    =s� �

    O1 þ 1� O1ð ÞO2� �2 > 0

    (36)

    and there exists an M0 such that for all M>M0, itholds that

    dF1dM M>M0

    < 0j (37)

    Let K2(M) = [O2 + ((H+ TpR)/s�O2)O1(1�RBER)sM+ (M+O2)M ln(1�RBER)s].

    Note that dF1dM ¼ O1 1�RBERð ÞsMK2 Mð Þ

    Mþ HþTpRð Þ=sð ÞO1 1�RBERð ÞsMþ 1�O1 1�RBERð ÞsMð Þ MþO2ð Þ½ �2and thus the sign of dF1/dM is the same as that of K2(M)for 0 Pmax=sð Þ

    0B@1CAI S2 ¼ gM G S1; ; S2ð Þ� �

    0BBBB@1CCCCA

    þI S1 <O2 �W H þ TpR

    � �=s

    W � 1 ≥S2� �

    min S1;Pmax=sf g

    þI S1≥O2 �W H þ TpR

    � �=s

    W � 1 < S2� �

    min S2;Pmax=sf g

    þI S1≥O2 �W H þ TpR

    � �=s

    W � 1 ≥S2� �

    minO2�W HþTpR

    � �=s

    W � 1 ;Pmax=s� �

    where Pmax is the capacity of application-level data in bitscarried in a frame.

    6. PERFORMANCE EVALUATION

    In this section, we obtain some numerical results for theperformance of CFB under different parameters. Let SRand GBN stand for selective-reject and go-back-N, respec-tively. In this section, we neither make limit of the maximumsize of a frame nor do we make limit of the capacity of theapplication-level data carried by a frame.

    urity Comm. Networks 2013; 6:942–954 © 2012 John Wiley & Sons, Ltd.DOI: 10.1002/sec

  • Cipher feedback mode under go-back-N and selective-rejectX. Liang et al.

    6.1. Optimality of M

    Figures 2 and 3 use the following parameters: H = 24� 8,H +LACK+ 2RTp+ 2RTprop = 16 800, H+ TpR= 42� 8 ands = 8. In Figure 2, we fix RBER = 0.0001. Figure 2 showsthe normalized throughput G with three different W valuesover the number of stages M in terms of throughput forboth selective-reject and go-back-N. As illustrated in Fig-ure 2, an optimal G value exists in both protocols, givena fixedW. With each fixedW, the optimal G in selective-re-ject is much greater than the one in go-back-N. In both pro-tocols, as W increases, the optimal M value decreases andthe optimal G value increases.

    In Figure 3, we fix W= 4. Figure 3 shows the through-put G over RBER under the optimal M value and other Mvalues in both selective-reject and go-back-N. As illus-trated in Figure 3, an optimalM value does provide the bestthroughput for both protocols. We observe that the optimalthroughput is an upper bound, or envelope, of the through-put with other chosen values. Furthermore, as RBER

    0 2000 4000 6000 80000

    0.1

    0.2

    0.3

    0.4

    0.5

    0.6

    0.7

    M

    App

    licat

    ion-

    leve

    l Thr

    ough

    put

    W=8,SRW=4,SRW=2,SRW=8,GBNW=4,GBNW=2,GBN

    Figure 2. Goodput versusM. SR, selective-reject; GBN, go-back-N.

    2 4 6 8 10

    x 10-4

    0

    0.1

    0.2

    0.3

    0.4

    0.5

    RBER

    App

    licat

    ion-

    leve

    l Thr

    ough

    put

    M=Moptimal,SR

    M=91,SRM=108,SRM=154,SRM=220,SRM=446,SRM=Moptimal,GBN

    M=91,GBNM=108,GBNM=154,GBNM=220,GBNM=446,GBN

    Figure 3. Goodput versus RBER. BER, bit error rate; SR, selective-reject; GBN, go-back-N.

    Security Comm. Networks 2013; 6:942–954 © 2012 John Wiley & Sons, Ltd.DOI: 10.1002/sec

    increases, the optimal throughput decreases in both proto-cols. With the same parameters, the optimal G in selec-tive-reject is much greater than that in go-back-N.

    Figure 4 uses the same parameter values as Figure 2, exceptthat it lets RBER vary from 0.0001 to 0.001. Figure 4 shows theoptimalM value with three different values ofW over RBER inboth go-back-N as well as the selective-reject. As illustratedin Figure 4, in both protocols, given a fixedW, the optimalM value decreases as the RBER increases. Furthermore, asW increases, the optimalM value decreases correspondingto any fixed value of RBER that we consider.

    6.2. Effect of s

    Figures 5–7 have the following parameters: H = 24� 8,H+ LACK + 2RTp+ 2RTprop= 16 800, H+ TpR= 42� 8 andRBER = 0.0001.

    We fix W= 4 in Figures 5 and 6. They show thethroughput G over s under the optimal M value and otherM values in selective-reject and go-back-N, respectively.As illustrated in both figures, an optimal M value does

    2 4 6 8 10

    x 10-4

    0

    200

    400

    600

    800

    1000

    RBER

    Opt

    imal

    M

    W=2,SRW=4,SRW=8,SRW=2,GBNW=4,GBNW=8,GBN

    Figure 4. OptimalM versusRBER. BER, bit error rate; SR, selective-reject; GBN, go-back-N.

    0 10 20 30 40 50 60 700

    0.2

    0.4

    0.6

    0.8

    1

    s

    App

    licat

    ion-

    leve

    l Thr

    ough

    put

    M=Moptimal,SR

    M=91,SRM=108,SRM=154,SRM=220,SRM=446,SR

    Figure 5. Goodput for selective-reject versus s. SR, selective-reject.

    951

  • 0 10 20 30 40 50 60 700

    0.1

    0.2

    0.3

    0.4

    0.5

    s

    App

    licat

    ion-

    leve

    l Thr

    ough

    put

    M=Moptimal,GBN

    M=91,GBNM=108,GBNM=154,GBNM=220,GBNM=446,GBN

    Figure 6. Goodput for go-back-N versus s. GBN, go-back-N.

    0 10 20 30 40 50 60 700

    1000

    2000

    3000

    4000

    5000

    6000

    7000

    8000

    s

    Opt

    imal

    M

    W=2,SRW=4,SRW=8,SRW=2,GBNW=4,GBNW=8,GBN

    Figure 7. Optimal M versus s. SR, selective-reject; GBN, go-back-N.

    Cipher feedback mode under go-back-N and selective-reject X. Liang et al.

    provide the best throughput. We observe that the optimalthroughput is an upper bound, or envelope, of thethroughput with other chosen values. Furthermore, as sincreases, the optimal throughput remains constant inboth protocols. This is because the product of s and Mcan be considered as a variable sM, and then, fromEquations (20) and (24), in the case of the independentvariables excluding a fixed sM, we can easily know thatEquations (20) and (24) are two functions of sM, whichonly have a maximum point.

    Figure 7 shows the optimal M value versus s, the num-ber of bits to encrypt each time, in both selective-reject andgo-back-N. As illustrated in Figure 7, the optimal M valuedecreases as the s value increases. Also, asW increases, theoptimal M value decreases corresponding to any fixedvalue of s we consider.

    7. CONCLUSIONS

    In this paper, we provided an error analysis of the stream-based CFB mode in an error channel under selective-reject

    952 Sec

    and go-back-N protocols. We analytically modeledthroughput. We solved the following optimality problem:given a bit error rate and the number of bits to encrypt eachtime, we wanted to obtain the optimal throughput with theoptimal number of stages. We made the following observa-tions: (1) In both protocols, given an RBER and a W, anoptimal value of G exists. Furthermore, as W increases,both optimal M values decrease, whereas both optimalvalues of G increase. (2) With the same parameters, theoptimal throughput in selective-reject is greater than thatin go-back-N. In other words, selective-reject performsbetter than go-back-N. (3) In both protocols, given a W,the optimal M value decreases as the RBER increases. (4)In both protocols, given a W and an s, an optimal M valueexists. The optimal M value decreases as the s valueincreases with a fixed W. (5) As W increases, the optimalM value decreases corresponding to any fixed value of swe consider.

    The proposed work is beneficial for designing the CFBunder sliding-window protocols as well as for obtainingdesigning parameters for the CFB in networks.

    ACKNOWLEDGEMENT

    This work is supported in part by The U.S. NationalScience Foundation (NSF), under grants CNS-0716211,CCF-0829827, CNS-0737325, and CNS-1059265.

    REFERENCES

    1. FIPS Publication 81. DES Modes of Operation, U.S.DoC/NIST, December 1980.

    2. Ts’o T. RFC 2952: Telnet encryption: DES 64 bitcipher feedback, Request for Comments, NetworkWorking Group, the Internet Society, 2000.

    3. Stallings W. High-speed Networks and Internets:Performance and Quality of Service (2nd edn). Pren-tice Hall: New Jersey, 2002.

    4. IEEE 802.11-1999. Part 11: Wireless LAN MediumAccess Control (MAC) and Physical Layer (PHY)specification, Standard, IEEE, August 1999.

    5. Rose G. A stream cipher based on linear feedbackover GF(28). Book Series Lecture Notes in ComputerScience 2006; 1438/1998:135–146.

    6. Hamdy N, El Megeed T, Hamad A, Kamal M.MANAGE1: New Stream Cipher for Data Encryptionin CDMA Wireless Networks. The 2006 InternationalConference on Computer Engineering and Systems,November 2006. ISBN: 1-4244-0271-9.

    7. Xiao Y, Chen H, Du X, Guizani M. Stream-basedCipher feedback mode in wireless error channels.IEEE Transactions on Wireless Communications2009; 8(2):622–626.

    urity Comm. Networks 2013; 6:942–954 © 2012 John Wiley & Sons, Ltd.DOI: 10.1002/sec

  • Cipher feedback mode under go-back-N and selective-rejectX. Liang et al.

    8. Xiao Y, Guizani M. Optimal stream-based cipherfeedback mode in error channel. Proceedings ofthe IEEE Global Telecommunications Conference(Globecom ’05), November 2005, 1660–1664.

    9. Liang X, Xiao Y, Vasilakos AV, Deng H, Meng K.CFB under sliding-window protocols in error channels,MILCOM 2010; 1502–1507.

    10. Boyer S, Robert J, Otrok H, Rousseau C. An adaptivetit-for-tat strategy for IEEE 802.11 CSMA/CAProtocol. International Journal of Security andNetworks (IJSN) 2012; 7(2).

    11. Kim K, Jeon J, Yoo K. Efficient and secure password au-thentication schemes for low-power devices. InternationalJournal of Sensor Networks 2006; 2(1/2):77–81.

    12. Wong DS, Tian X. E-mail protocols with perfectforward secrecy. International Journal of Securityand Networks 2012; 7(1): 1–5.

    13. Janies J, Huang C, Johnson NL, Richardson T. SUMP:a secure unicast messaging protocol for wireless adhoc sensor networks. International Journal of SensorNetworks 2007; 2(5/6):358–367.

    14. Vespa L, Chakrovorty R, Weng N. Lightweight testbedfor evaluating worm containment systems. InternationalJournal of Security and Networks 2012; 7(1): 6–16.

    15. Cam H. Multiple-input turbo code for secure dataaggregation and source-channel coding in wirelesssensor networks. International Journal of SensorNetworks 2007; 2(5/6):375–385.

    16. Kandah F, Singh Y, Zhang W, Wang T. A misleadingactive routing attack in mobile ad-hoc networks.International Journal of Security and Networks 2012;7(1): 17–29.

    17. Butun I, Wang Y, Lee Y, Sankar R. Intrusion preven-tion with two level user authentication in heteroge-neous wireless sensor networks. InternationalJournal of Security and Networks (IJSN) 2012; 7(2).

    18. Yao Z, Kim D, Doh Y. PLUS: parameterised localisedtrust management-based security framework for sensornetworks. International Journal of Sensor Networks2008; 3(4):224–236.

    19. Xiao Y. Editorial: security and privacy issues. Interna-tional Journal of Security and Networks (IJSN) 2012; 7(2).

    20. Alsubhi K, Alhazmi Y, Bouabdallah N, Boutaba R.Security configuration management in intrusion detec-tion and prevention systems. International Journal ofSecurity and Networks 2012; 7(1): 30–39.

    21. Chang CG, Snyder WE, Wang C. Secure target locali-sation in sensor networks using relaxation labelling.International Journal of Sensor Networks 2008; 4(3):172–184.

    22. Kolesnikov V, Lee W. MAC aggregation resilient toDoS attacks. International Journal of Security andNetworks (IJSN) 2012; 7(2).

    Security Comm. Networks 2013; 6:942–954 © 2012 John Wiley & Sons, Ltd.DOI: 10.1002/sec

    23. Xiao Z, XiaoY. PeerReview re-evaluation for accountabil-ity in distributed systems or networks. International Jour-nal of Security and Networks 2012; 7(1): 40–58.

    24. Baig ZA. Rapid anomaly detection for smart grid infra-structures through hierarchical pattern matching. Interna-tional Journal of Security and Networks (IJSN) 2012; 7(2).

    25. Szczechowiak P, Scott M, Collier M. Securing wire-less sensor networks: an identity-based cryptographyapproach. International Journal of Sensor Networks2010; 8(3/4):182–192.

    26. Neji NB, Bouhoula A. Managing hybrid packet filter’sspecifications. International Journal of Security andNetworks (IJSN) 2012; 7(2).

    27. Al-Salloum ZS. Defensive computer worms—an over-view. International Journal of Security and Networks2012; 7(1): 59–70.

    28. Krontiris I, Dimitriou T. Scatter—secure code authen-tication for efficient reprogramming in wireless sensornetworks. International Journal of Sensor Networks2011; 10(1/2):14–24.

    29. Chen Z, Chen C, Li Y. Deriving a closed-form expres-sion for worm-scanning strategies. International Jour-nal of Security and Networks 2009; 4(3):135–144.

    30. Lee S, Sivalingam KM. An efficient one-time pass-word authentication scheme using a smart card. Inter-national Journal of Security and Networks 2009; 4(3):145–152.

    31. Watkins L, Beyah R, Corbett C. Using link RTT topassively detect unapproved wireless nodes. Interna-tional Journal of Security and Networks 2009; 4(3):153–163.

    32. Drakakis KE, Panagopoulos AD, Cottis PG. Overviewof satellite communication networks security: intro-duction of EAP. International Journal of Securityand Networks 2009; 4(3):164–170.

    33. Chakrabarti S, Chandrasekhar S, Singhal M. Anescrow-less identity-based group-key agreementprotocol for dynamic peer groups. International Jour-nal of Security and Networks 2009; 4(3):171–188.

    34. Ehlert S, Rebahi Y, Magedanz T. Intrusion detectionsystem for denial-of-service flooding attacks in SIPcommunication networks. International Journal ofSecurity and Networks 2009; 4(3):189–200.

    35. Berthier R, Cukier M. An evaluation of connection char-acteristics for separating network attacks. InternationalJournal of Security andNetworks 2009; 4(1/2):110–124.

    36. Wu B, Wu J, Dong Y. An efficient group keymanagement scheme for mobile ad hoc networks.International Journal of Security and Networks 2009;4(1/2):125–134.

    37. Mayrhofer R, Nyberg K, Kindberg T. Foreword.International Journal of Security and Networks 2009;4(1/2):1–3.

    953

  • Cipher feedback mode under go-back-N and selective-reject X. Liang et al.

    38. Scannell A, Varshavsky A, LaMarca A, De Lara E.Proximity-based authentication of mobile devices.International Journal of Security and Networks 2009;4(1/2):4–16.

    39. Soriente C, Tsudik G, Uzun E. Secure pairing ofinterface constrained devices. International Journalof Security and Networks 2009; 4(1/2):17–26.

    40. Buhan I, Boom B, Doumen J, Hartel PH, VeldhuisRNJ. Secure pairing with biometrics. InternationalJournal of Security and Networks 2009; 4(1/2):27–42.

    41. McCune JM, Perrig A, Reiter MK. Seeing-is-believing:using camera phones for human-verifiable authentica-tion. International Journal of Security and Networks2009; 4(1/2):43–56.

    42. Goodrich MT, Sirivianos M, Solis J, Soriente C,Tsudik G, Uzun E. Using audio in secure devicepairing. International Journal of Security andNetworks 2009; 4(1/2):57–68.

    43. Laur S, Pasini S. User-aided data authentication.International Journal of Security and Networks 2009;4(1/2):69–86.

    44. Suomalainen J, Valkonen J, Asokan N. Standards forsecurity associations in personal networks: a comparativeanalysis. International Journal of Security and Networks2009; 4(1/2):87–100.

    45. Kuo C, Perrig A, Walker J. Designing user studiesfor security applications: a case study with wirelessnetwork configuration. International Journal ofSecurity and Networks 2009; 409(1/2):101–109.

    46. Bai L, Zou X. A proactive secret sharing schemein matrix projection method. International Journal ofSecurity and Networks 2009; 4(4):201–209.

    954 Sec

    47. Bettahar H, Alkubeily M, Bouabdallah A. TKS: a tran-sition key management scheme for secure applicationlevel multicast. International Journal of Security andNetworks 2009; 4(4):210–222.

    48. Huang H, Kirchner H, Liu S, Wu W. Handlinginheritance violation for secure interoperation ofheterogeneous systems. International Journal ofSecurity and Networks 2009; 4(4):223–233.

    49. Rekhis S, Boudriga NA. Visibility: a novel conceptfor characterising provable network digital evidences.International Journal of Security and Networks 2009;4(4):234–245.

    50. Djenouri D, Bouamama M, Mahmoudi O. Black-hole-resistant ENADAIR-based routing protocol forMobile Ad hoc Networks. International Journal ofSecurity and Networks 2009; 4(4):246–262.

    51. Hu F, Dong D, Xiao Y. Attacks and countermeasures inmulti-hop Cognitive Radio Networks. InternationalJournal of Security and Networks 2009; 4(4):263–271.

    52. FIPS Publication 46-3. Data Encryption Standard(DES), U.S. DoC/NIST, October 25, 1999.

    53. FIPS Publication 800-38A. Recommendation for BlockCipher Modes of Operation: Methods and Techniques,U.S. DoC/NIST, 2001.

    54. Qi J, Aissa S, Zhao X. Optimal frame length forkeeping normalized goodput with lowest requirementon BER. Proceedings of the 4th International Confer-ence on Innovations in Information Technology,2007; 715–719.

    55. Kurose J, Ross K. Computer Networking: a Top–DownApproach (4th edn). Addison Wesley, 2007 Boston,MA.

    urity Comm. Networks 2013; 6:942–954 © 2012 John Wiley & Sons, Ltd.DOI: 10.1002/sec