Encrypted Data Transmission Model For Ethernet LANs

Despite many research and development efforts in the field of data communication security, the security of the local area network (LAN's) is still not fully resolved. In this work, we proposed a model of encryption of the data field in the Ethernet frame to create secure Ethernet LANs. In this model, the data field in the Ethernet frame is encrypted and sent to the destination. The 1500-byte data field, defined as the standard for the Ethernet frame, is divided into 1497 bytes as the field used for the data. The remaining 2-bytes are defined as Message Body Length (MBL) and 1-byte as Message Number (MN). The message number is used to verify the encrypted data and the MBL is used for the length of the message. The proposed model provides secure data communication over Ethernet local area networks. Even if attackers obtain the packet at the time of communication, the encrypted message is difficult to decipher.

___

A. Pérez-Resa, et al., “Using a Chaotic Cipher to Encrypt Ethernet Traffic,” In Circuits and Systems (ISCAS), 2018 IEEE International Symposium on, pp. 1-5, 2018.

T. Kiravuo, et al., “A Survey of Ethernet LAN Security,” In IEEE Communications Surveys & Tutorials, vol. 15, no. 3, pp. 1477- 1491, 2013.

IEEE Standard for Ethernet, IEEE Std., Rev. IEEE Std. 802.3-2015 (Revision of IEEE Std. 802.3-2012), Mar. 2016.

J. Postel, J. Reynolds, “A Standard for the Transmission of IP Datagrams over IEEE 802 Networks,” RFC 1042, 1988.

IEEE, "IEEE Standards for Local Area Networks: Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Access Method and Physical Layer Specifications," IEEE, New York, 1985.

IEEE, "IEEE Standards for Local Area Networks: Token-Passing Bus Access Method and Physical Layer Specification," IEEE, New York, 1985.

IEEE, "IEEE Standards for Local Area Networks: Token Ring Access Method and Physical Layer Specifications," IEEE, New York, 1985.

IEEE, "IEEE Standards for Local Area Networks: Logical Link Control", IEEE, New York, 1985.

Cisco Systems, "Cisco Global Cloud Index: Forecast and Methodology 2015-2020," 2016.

K. F. Wahid, “Rethinking the link security approach to manage large-scale Ethernet network,” In Local and Metropolitan Area Networks (LANMAN), 17th IEEE Workshop on, pp. 1-6, 2010.

R. Khoussainov, A. Patel,” LAN security: problems and solutions for Ethernet networks,” Computer Standards & Interfaces, Vol. 22, no. 3, pp. 191-202, 2000.

N. Hadjina, P. Thompson,” Data security on Ethernet LANs,” 10th Mediterranean Electrotechnical Conference. Information Technology and Electrotechnology for the Mediterranean Countries Proceedings. MeleCon 2000 (Cat. No.00CH37099), Lemesos, vol.1, pp. 23-26, 2000.

A. Pérez-Resa, et al., “Using a Chaotic Cipher to Encrypt Ethernet Traffic,” In Circuits and Systems (ISCAS), 2018 IEEE International Symposium on, pp. 1-5, 2018.

G. King, “A survey of commercially available secure LAN products,” In Computer Security Applications Conference, Fifth Annual, pp. 239–247, 1989.

R. Housley, “Encapsulation security protocol design for local area networks,” In Local Area Network Security. Lecture Notes in Computer Science, T. Berson and T. Beth, Eds. Springer Berlin Heidelberg, vol. 396, ch. 10, pp. 103–109, 1989.

F. Poon, M. Iqbal, “Design of a physical layer security mechanism for CSMA/CD networks,” Communications, Speech and Vision, IEE Proceedings I, vol. 139, no. 1, pp. 103–112, 1992.

M. Soriano, et al., “A particular solution to provide secure communications in an Ethernet environment,” In CCS’93: Proc. 1st ACM conference on Computer and communications security, NY, USA: ACM Press, pp. 17–25, 1993.

M. El-Hadidi, et al., “Implementation of a hybrid encryption scheme for Ethernet,” In Computers and Communications, Proceedings. IEEE Symposium on. IEEE Comput. Soc. Press, pp. 150–156, 1995.

C. Bayilmis, et al., “Enhanced secure data transfer for WSN using chaotic-based encryption,“ Tehnicki Vjesnik-Technical Gazette vol.24, no.4, pp. 1065-1070, 2017.

C. Bayilmis, et al., "Employing Chaotic Encryption for IEEE 802.15. 4-based LRWPANs." International Conference on Computer Science and Information Systems (ICSIS’2014), pp. 89-92, 2014.

G. E. Pake, “Research at Xerox PARC: A Founder's Assessment,” IEEE Spectrum, vol. 22, no. 10, pp. 54-61, 1985.

R. M. Metcalfe, “Computer/network interface design: Lessons from Arpanet and Ethernet,” IEEE Journal on Selected Areas in Communications, vol.11, no. 2, pp. 173- 180, 1993.

"802.3-2012 – IEEE Standard for Ethernet" (PDF). ieee.org. IEEE Standards Association. 2012-12-28.

M. Khan, M. Ayyoob, “Computer Security in the Human Life,” International Journal of Computer Science and Engineering (IJCSE), vol. 6, no. 1, pp. 35-42, 2017.

A. Zúquete, et al., “Packet tagging system for enhanced traffic profiling,” In Internet Multimedia Systems Architecture and Application (IMSAA), 2011 IEEE 5th International Conference on, pp. 1-6, 2011.

L. Heberlein, et al., “A network security monitor,” In Research in Security and Privacy, Proceedings, IEEE Computer Society Symposium on. IEEE, pp. 296-304, 1990.

J. Akram et al., “Future and Techniques of Implementing Security in VLAN,” Journal of Network Communications and Emerging Technologies (JNCET), vol. 7, no. 5, pp. 14-17, 2017.

A. Mehdizadeha, et al., “Virtual Local Area Network (VLAN): Segmentation and Security,” In The Third International Conference on Computing Technology and Information Management (ICCTIM2017), pp. 78-89, 2017.

S. Lin, et al., “A design of the ethernet firewall based on FPGA,” In Image and Signal Processing, Biomedical Engineering and Informatics (CISP-BMEI), 10th International Congress on IEEE, pp. 1-5, 2017.

S. Yonghong, et al., “Design of Security Gateway Based On Dual-Homed Architecture,” International Conference on Robots & Intelligent System, pp. 159-163, 2016.

A. Pérez-Resa, et al., “Using a Chaotic Cipher to Encrypt Ethernet Traffic,” In Circuits and Systems (ISCAS), International Symposium on IEEE, pp. 1-5, 2018.

A. Yin, S. Wang, “A novel encryption scheme based on timestamp in gigabit Ethernet passive optical network using AES-128,” Optik-International Journal for Light and Electron Optics, vol. 125, no. 3, pp. 1361-1365, 2014.

D. Pawar, “Survey on network based cryptographic techniques for key generation and data Encryption/Decryption,” International Research Journal of Engineering and Technology (IRJET), vol. 4, no. 5, pp. 1361-1363, 2017.

R. Karmakar, et al., “Enhancing security of logic encryption using embedded key generation unit,” In Test Conference in Asia (ITC-Asia), International IEEE, pp. 131- 136, 2017.

M. Durak, "Ethernet ağlarda güvenli veri iletişimi," Gazi University Faculty of Technology Computer Engineering graduation thesis, 2018.