A RAM-Based MAC Table with Two-Tier Security at Layer 2

被引:0
|
作者
Ray, Sanchita Saha [1 ]
Das, Krishnendu [2 ]
Ghosh, Surajeet [3 ]
机构
[1] St Thomas Coll Engn & Technol, Dept Informat Technol, Khidderpore, India
[2] Cognizant Technol Solut Pvt Ltd, Bangalore, Karnataka, India
[3] Indian Inst Engn Sci & Technol, Dept Comp Sci & Technol, Howrah, India
关键词
MAC table; RAM-based MAC table; security at layer 2; security at data-link layer; two-tier security;
D O I
10.1080/03772063.2015.1117953
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A novel architecture has been presented in this paper which replaces the conventional content addressable memory (CAM)-based media access control (MAC) table by a RAM-based MAC table. The proposed RAM-based MAC table stores only the port numbers instead of both MAC addresses and their associated port numbers. The architecture also prevents unauthorized access to data in a network by disallowing broadcasting of an incoming frame and instead it broadcasts a control signal to every other host except the sender in the network requesting a response from the intended recipient. In this architecture, a two-tier security at data-link layer has also been established by introducing two additional fields of security keys (primary and secondary) to tighten the security. The proposed architecture has been compared with the existing and improved CAM-based approaches and shows 50% lesser number of transistor count usage. This leads to less heat dissipation and power consumption.
引用
收藏
页码:435 / 445
页数:11
相关论文
共 50 条
  • [1] The Lyapunov Optimization for Two-Tier Hierarchical-Based MAC in Cloud Robotics
    Hu, Yansu
    Gao, Ang
    Wang, Changqing
    Cao, Wen
    Yan, Maode
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [2] Two-tier blockchain timestamped notarization with incremental security
    Meneghetti, Alessio
    Quintavalle, Armanda O.
    Sala, Massimiliano
    Tomasi, Alessandro
    [J]. Annals of Emerging Technologies in Computing, 2019, 3 (5 Special Issue) : 25 - 33
  • [3] 2TM-MAC : A Two-Tier Multi-channel Interference Mitigation MAC Protocol for Coexisting WBANs
    Yuan, Xiaoming
    Han, Jiaxin
    Pan, Jun
    Zhang, Kuan
    Li, Changle
    Ye, Qiang
    [J]. 2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [4] Hybrid Two-Tier Framework for Improved Security in Cloud Environment
    Singh, Aarti
    Malhotra, Manisha
    [J]. PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 955 - 960
  • [5] A politically feasible social security reform with a two-tier structure
    Yamada, Tomoaki
    [J]. JOURNAL OF THE JAPANESE AND INTERNATIONAL ECONOMIES, 2011, 25 (03) : 199 - 224
  • [6] RAM-Based Firmware Attestation for IoT Security: A Representation Learning Framework
    Iqbal, Asif
    Zia, Usman
    Aman, Muhammad Naveed
    Sikdar, Biplab
    [J]. IEEE Internet of Things Journal, 2024, 11 (21) : 35124 - 35140
  • [7] An Efficient Two-tier MAC Scheme for Satellite Machine-to-Machine Communications
    Bartoli, Giulio
    Fantacci, Romano
    Marabissi, Dania
    [J]. 2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [8] Two-tier based intrusion detection system
    Kim, BJ
    Kim, IK
    [J]. FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, PT 2, PROCEEDINGS, 2005, 3614 : 581 - 591
  • [9] RAM-BASED EPROM SIMULATOR USES 2 ICS
    FOX, G
    [J]. EDN MAGAZINE-ELECTRICAL DESIGN NEWS, 1985, 30 (09): : 282 - 282
  • [10] A two-tier security solution for storing data across public cloud
    Sharma, Kavita
    Rafiqui, Fatima
    Diksha
    Attri, Prabhanshu
    Yadav, Sumit Kumar
    [J]. Recent Patents on Computer Science, 2019, 12 (03): : 191 - 201