HEAP: Hop-by-hop efficient authentication protocol for mobile Ad-hoc networks

Rehan Akbani, Turgay Korkmaz, G. V.S. Raju

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Abstract

In Mobile Ad-hoc Networks (MANETs), it is easy to launch various sophisticated attacks such as wormhole, man-in-the-middle and Denial of Service (DoS), or to impersonate another node. To combat such attacks from outsider nodes, we study packet authentication in wireless networks and propose a Hop-by-hop, Efficient Authentication Protocol, called HEAP. HEAP authenticates packets at every hop by using a modified HMAC-based algorithm along with two keys and drops any packets that originate from outsiders. HEAP can be used with multicast, unicast or broadcast applications. We ran several simulations to compare HEAP with existing authentication schemes, such as TESLA, LHAP and Lu and Pooch's algorithm. We measured metrics such as latency, throughput, packet delivery ratio, CPU and memory utilization and show that HEAP performs very well compared to other schemes while guarding against outsider attacks.

Original languageEnglish (US)
Title of host publication10th Communications and Networking Simulation Symposium, CNS 2007, Part of the 2007 Spring Simulation Multiconference, SpringSim 2007
Pages157-165
Number of pages9
StatePublished - 2007
Externally publishedYes
Event10th Communications and Networking Simulation Symposium, CNS 2007, Part of the 2007 Spring Simulation Multiconference, SpringSim 2007 - Norfolk, VA, United States
Duration: Mar 25 2007Mar 29 2007

Publication series

NameSimulation Series
ISSN (Print)0735-9276

Other

Other10th Communications and Networking Simulation Symposium, CNS 2007, Part of the 2007 Spring Simulation Multiconference, SpringSim 2007
Country/TerritoryUnited States
CityNorfolk, VA
Period3/25/073/29/07

Keywords

  • Authentication
  • HEAP
  • MANETs
  • Mobile Ad-hoc networks
  • Security

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'HEAP: Hop-by-hop efficient authentication protocol for mobile Ad-hoc networks'. Together they form a unique fingerprint.

Cite this