Implementing ECC on Data Link Layer of the OSI Reference Model
|International Journal of Computer Science and Engineering|
|© 2021 by SSRG - IJCSE Journal|
|Volume 8 Issue 9|
|Year of Publication : 2021|
|Authors : Donald Somiari Ene, Isobo Nelson Davies, Godwin Fred Lenu, Ibiere Boma Cookey|
How to Cite?
Donald Somiari Ene, Isobo Nelson Davies, Godwin Fred Lenu, Ibiere Boma Cookey, "Implementing ECC on Data Link Layer of the OSI Reference Model," SSRG International Journal of Computer Science and Engineering , vol. 8, no. 9, pp. 12-16, 2021. Crossref, https://doi.org/10.14445/23488387/IJCSE-V8I9P103
The Internet, a rapidly expanding communication infrastructure, poses significant cybersecurity challenges. A few techniques have been developed to provide security in the OSI model's application, presentation, and network layers. Instead of using Media Access Control (MAC), this paper recommends using public key Elliptic Curve Cryptography to serve the Data Link Layer. On a microFourQ-MSP-IAR Embedded Workbench IDE-MSP430 7.12.4, a prototype of the architecture was implemented. When the cost of key generation was compared to the curve, it was shown that they are directly related. The cost of key generation time rises in proportion to the bit length of the curve. Because of the large number of connected devices that may be exposed due to a lack of effective security in the data link layer, significant concerns arise in terms of network privacy, governance, and security. As a result, this research suggests using a public key cryptosystem based on an elliptic curve to secure the data link layer for safe data communication in Internet-connected devices.
Cryptography, Data Link Layer, ECC, Elliptic Curve, Encryption, NIST, OSI
 Cisco. Cisco cybersecurity essentials (2016).
 R. Miller, The OSI Model: An Overview. Boston: SANS Institute (2019).
 A. Annapurna, S. Madhuri, and D. Mohammed Data Link Layer Security Issues. International Journal of Computer Science & Engineering Technology, (2013) 1009-1102..
 T. OConnor Detecting and Responding to Data Link Layer Attacks. Boston: SANS Institute (2019).
 K., Li, J. Tao, and S. Sampalli Detection of Spoofed MAC Addresses in 802.11 Wireless Networks . Springer, (2008) 201-213.
 K. Yeung, D. Fung, and K. Wong Tools for attacking layer 2 network infrastructure. Proceedings of the International MultiConference of Engineers and Computer Scientists (2008).
 O. Younes Securing ARP and DHCP for mitigating link layer attacks. Indian Academy of Sciences, (2017) 2041-2053.
 K. Singh, and L. Liu Security Issues in Wireless Networks. Research Gate, (2014) 1-5.
 J. Olenski ECC 101: What is ECC and why would I want to use it? Retrieved September 17, 2019, from GlobalSign GMO Internt Group: https://www.globalsign.com/en/blog/elliptic-curve-cryptography/ (2015, May 29).
 S. Shamus M.I.R.A.C.L. User Manual. Dublin (2005).