LHAP: a lightweight hop-by-hop authentication protocol for ad-hoc networks

@article{Zhu2003LHAPAL,
  title={LHAP: a lightweight hop-by-hop authentication protocol for ad-hoc networks},
  author={Sencun Zhu and Shouhuai Xu and Sanjeev Setia and Sushil Jajodia},
  journal={23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings.},
  year={2003},
  pages={749-755}
}
  • Sencun Zhu, Shouhuai Xu, +1 author S. Jajodia
  • Published 2003
  • Computer Science
  • 23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings.
Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the network with the goal of depleting the resources Of the nodes relaying the packets. To thwart or prevent such attacks, it is necessary to employ authentication mechanisms that ensure that only authorized nodes can inject traffic into the network. In this paper we present LHAP a scalable and light-weight authentication… Expand
LIP : A Lightweight Interlayer Protocol for Network Access Control in Mobile Ad-Hoc Networks
Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to packet injection attacks where a malicious node injects a large number of packets into theExpand
LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network
TLDR
This work designs a Lightweight Inter-layer Protocol (LIP) for preventing packet injection attacks based on an efficient local broadcast authentication mechanism that can also detect and minimise the impersonation attacks by compromised nodes. Expand
ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication
TLDR
This paper presents ALPHA, an Adaptive and Lightweight Protocol for Hop-by-hop Authentication, establishing a verifiable notion of identity for network traffic, based on computationally cheap hash functions, enabling end-to-end as well as hop- by-hop integrity protection for unicast traffic. Expand
HEAP: hop-by-hop efficient authentication protocol for Mobile Ad-hoc Networks
TLDR
This work studies packet authentication in wireless networks and proposes a Hop-by-hop, Efficient Authentication Protocol, called HEAP, which authenticates packets at every hop by using a modified HMAC-based algorithm along with two keys and drops any packets that originate from outsiders. Expand
HEAP: A packet authentication scheme for mobile ad hoc networks
TLDR
This work studies packet authentication in wireless networks and proposes a hop-by-hop, efficient authentication protocol, called HEAP, which authenticates packets at every hop by using a modified HMAC-based algorithm along with two keys and drops any packets that originate from outsiders. Expand
A lightweight authentication protocol for mobile ad hoc networks
  • Bin Lu, U. Pooch
  • Computer Science
  • International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II
  • 2005
TLDR
A lightweight authentication protocol is proposed, which utilizes one-way hash chain to provide effective and efficient authentication for communications between neighboring nodes in MANETs. Expand
Filtering False Messages En-Route in Wireless Multi-Hop Networks
  • Yu-Shian Chen, C. Lei
  • Computer Science
  • 2010 IEEE Wireless Communication and Networking Conference
  • 2010
TLDR
This work utilizes Bloom filter techniques to build an authentication manifest, which is called en-route authentication bitmap (EAB), which helps nodes on the routing path to filter out false data in high success rate, thus confine the injection attacks within the one or two hops from the adversary. Expand
Privacy Aware Protocol for Spontaneous Ad hoc Network
Ad-hoc network must operate independent of a pre-established or centralized network management infrastructure, providing administrative services needed to support applications. Address allocation,Expand
Authentication protocols for ad hoc networks: taxonomy and research issues
TLDR
This paper proposes a generic authentication process and a new taxonomy that clarifies similarities and differences among authentication protocols reported in the literature and motivates the need for an authentication management architecture. Expand
An Authenticated Key Agreement Protocol for Mobile Ad Hoc Networks
TLDR
It can be observed from the experiments that the new scheme is comparable with the CRTDH scheme and better than many other non-authenticated schemes in terms of performance. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 40 REFERENCES
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks
TLDR
This paper presents attacks against routing in ad hoc networks, and the design and performance evaluation of a new secure on-demand ad hoc network routing protocol, called Ariadne, which prevents attackers or compromised nodes from tampering with uncompromising routes consisting of uncompromised nodes. Expand
Securing ad hoc networks
TLDR
This article takes advantage of the inherent redundancy in ad hoc networks-multiple routes between nodes-to defend routing against denial-of-service attacks and uses replication and new cryptographic schemes to build a highly secure and highly available key management service, which terms the core of this security framework. Expand
Talking to Strangers: Authentication in Ad-Hoc Wireless Networks
TLDR
This paper presents a user-friendly solution, which provides secure authentication using almost any established public-key-based key exchange protocol, as well as inexpensive hash-based alternatives, over the wireless link. Expand
SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks
TLDR
The Secure Efficient Ad hoc Distance vector routing protocol (SEAD) is designed and evaluated, a secure ad hoc network routing protocol based on the design of the Destination-Sequenced Distance-Vector routing protocol that performs well over the range of scenarios and is robust against multiple uncoordinated attackers creating incorrect routing state in any other node. Expand
Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks
As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularlyExpand
Packet leashes: a defense against wormhole attacks in wireless networks
  • Y. Hu, A. Perrig, D. Johnson
  • Computer Science
  • IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428)
  • 2003
TLDR
A new, general mechanism, called packet leashes, is presented for detecting and thus defending against wormhole attacks, and a specific protocol is presented, called TIK, that implements leashes. Expand
A secure routing protocol for ad hoc networks
TLDR
This work details security threats against ad hoc routing protocols, specifically examining AODV and DSR, and proposes a solution to one, the managed-open scenario where no network infrastructure is pre-deployed, but a small amount of prior security coordination is expected. Expand
Providing robust and ubiquitous security support for mobile ad-hoc networks
TLDR
This paper describes a solution that supports ubiquitous security services for mobile hosts, scales to network size, and is robust against break-ins and employs localized certification schemes to enable ubiquitous services. Expand
Secure pebblenets
TLDR
This work proposes a key management scheme to periodically update the symmetric keys used by all pebbles, combining mobility-adaptive clustering and an effective probabilistic selection of the key-generating node, which meets the requirements of efficiency, scalability and security needed for the survivability of networks of pebble (pebblenets). Expand
Efficient and Secure Source Authentication for Multicast
TLDR
This paper proposes several substantial modifications and improvements to TESLA, which allows receivers to authenticate most packets as soon as they arrive, and improves the scalability of the scheme, reduce the space overhead for multiple instances, increase its resistance to denial-of-service attacks, and more. Expand
...
1
2
3
4
...