LHAP: a lightweight hop-by-hop authentication protocol for ad-hoc networks

  title={LHAP: a lightweight hop-by-hop authentication protocol for ad-hoc networks},
  author={Sencun Zhu and Shouhuai Xu and Sanjeev Setia and Sushil Jajodia},
  journal={23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings.},
  • Sencun ZhuShouhuai Xu S. Jajodia
  • Published 19 May 2003
  • Computer Science
  • 23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings.
Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the network with the goal of depleting the resources Of the nodes relaying the packets. To thwart or prevent such attacks, it is necessary to employ authentication mechanisms that ensure that only authorized nodes can inject traffic into the network. In this paper we present LHAP a scalable and light-weight authentication… 

Figures from this paper

LIP : A Lightweight Interlayer Protocol for Network Access Control in Mobile Ad-Hoc Networks

A Lightweight Inter-layer Protocol for network access control based on efficient local broadcast authentication mechanisms that can detect and minimize the impersonation attacks by compromised insider nodes and is integrated seamlessly with secure routing protocols, providing stronger security services for ad hoc networks.

LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network

This work designs a Lightweight Inter-layer Protocol (LIP) for preventing packet injection attacks based on an efficient local broadcast authentication mechanism that can also detect and minimise the impersonation attacks by compromised nodes.

ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication

This paper presents ALPHA, an Adaptive and Lightweight Protocol for Hop-by-hop Authentication, establishing a verifiable notion of identity for network traffic, based on computationally cheap hash functions, enabling end-to-end as well as hop- by-hop integrity protection for unicast traffic.

HEAP: hop-by-hop efficient authentication protocol for Mobile Ad-hoc Networks

This work studies packet authentication in wireless networks and proposes a Hop-by-hop, Efficient Authentication Protocol, called HEAP, which authenticates packets at every hop by using a modified HMAC-based algorithm along with two keys and drops any packets that originate from outsiders.

A lightweight authentication protocol for mobile ad hoc networks

  • Bin LuU. Pooch
  • Computer Science
    International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II
  • 2005
A lightweight authentication protocol is proposed, which utilizes one-way hash chain to provide effective and efficient authentication for communications between neighboring nodes in MANETs.

Filtering False Messages En-Route in Wireless Multi-Hop Networks

  • Yu-Shian ChenC. Lei
  • Computer Science
    2010 IEEE Wireless Communication and Networking Conference
  • 2010
This work utilizes Bloom filter techniques to build an authentication manifest, which is called en-route authentication bitmap (EAB), which helps nodes on the routing path to filter out false data in high success rate, thus confine the injection attacks within the one or two hops from the adversary.

Authentication protocols for ad hoc networks: taxonomy and research issues

This paper proposes a generic authentication process and a new taxonomy that clarifies similarities and differences among authentication protocols reported in the literature and motivates the need for an authentication management architecture.

An Authenticated Key Agreement Protocol for Mobile Ad Hoc Networks

It can be observed from the experiments that the new scheme is comparable with the CRTDH scheme and better than many other non-authenticated schemes in terms of performance.



Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks

This paper presents attacks against routing in ad hoc networks, and the design and performance evaluation of a new secure on-demand ad hoc network routing protocol, called Ariadne, which prevents attackers or compromised nodes from tampering with uncompromising routes consisting of uncompromised nodes.

Securing ad hoc networks

This article takes advantage of the inherent redundancy in ad hoc networks-multiple routes between nodes-to defend routing against denial-of-service attacks and uses replication and new cryptographic schemes to build a highly secure and highly available key management service, which terms the core of this security framework.

SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks

The Secure Efficient Ad hoc Distance vector routing protocol is designed and evaluated, a secure ad hoc network routing protocol based on the design of the Destination-Sequenced Distance-Vector routing protocol (DSDV), which performs well over the range of scenarios, and is robust against multiple uncoordinated attackers creating incorrect routing state in any other node.

Talking to Strangers: Authentication in Ad-Hoc Wireless Networks

This paper presents a user-friendly solution, which provides secure authentication using almost any established public-key-based key exchange protocol, as well as inexpensive hash-based alternatives, over the wireless link.

Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks

A new, general mechanism, called packet leashes, is presented for detecting and thus defending against wormhole attacks, and a specific protocol is presented, called TIK, that implements leashes.

Packet leashes: a defense against wormhole attacks in wireless networks

  • Yih-Chun HuA. PerrigDavid B. Johnson
  • Computer Science
    IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428)
  • 2003
A new, general mechanism, called packet leashes, is presented for detecting and thus defending against wormhole attacks, and a specific protocol is presented, called TIK, that implements leashes.

A secure routing protocol for ad hoc networks

This work details security threats against ad hoc routing protocols, specifically examining AODV and DSR, and proposes a solution to one, the managed-open scenario where no network infrastructure is pre-deployed, but a small amount of prior security coordination is expected.

Providing robust and ubiquitous security support for mobile ad-hoc networks

This paper describes a solution that supports ubiquitous security services for mobile hosts, scales to network size, and is robust against break-ins and employs localized certification schemes to enable ubiquitous services.

Secure pebblenets

This work proposes a key management scheme to periodically update the symmetric keys used by all pebbles, combining mobility-adaptive clustering and an effective probabilistic selection of the key-generating node, which meets the requirements of efficiency, scalability and security needed for the survivability of networks of pebble (pebblenets).

Efficient and Secure Source Authentication for Multicast

This paper proposes several substantial modifications and improvements to TESLA, which allows receivers to authenticate most packets as soon as they arrive, and improves the scalability of the scheme, reduce the space overhead for multiple instances, increase its resistance to denial-of-service attacks, and more.