TY - GEN
T1 - HEAP
T2 - 10th Communications and Networking Simulation Symposium, CNS 2007, Part of the 2007 Spring Simulation Multiconference, SpringSim 2007
AU - Akbani, Rehan
AU - Korkmaz, Turgay
AU - Raju, G. V.S.
N1 - Copyright:
Copyright 2014 Elsevier B.V., All rights reserved.
PY - 2007
Y1 - 2007
N2 - In Mobile Ad-hoc Networks (MANETs), it is easy to launch various sophisticated attacks such as wormhole, man-in-the-middle and Denial of Service (DoS), or to impersonate another node. To combat such attacks from outsider nodes, we study packet authentication in wireless networks and propose a Hop-by-hop, Efficient Authentication Protocol, called HEAP. HEAP authenticates packets at every hop by using a modified HMAC-based algorithm along with two keys and drops any packets that originate from outsiders. HEAP can be used with multicast, unicast or broadcast applications. We ran several simulations to compare HEAP with existing authentication schemes, such as TESLA, LHAP and Lu and Pooch's algorithm. We measured metrics such as latency, throughput, packet delivery ratio, CPU and memory utilization and show that HEAP performs very well compared to other schemes while guarding against outsider attacks.
AB - In Mobile Ad-hoc Networks (MANETs), it is easy to launch various sophisticated attacks such as wormhole, man-in-the-middle and Denial of Service (DoS), or to impersonate another node. To combat such attacks from outsider nodes, we study packet authentication in wireless networks and propose a Hop-by-hop, Efficient Authentication Protocol, called HEAP. HEAP authenticates packets at every hop by using a modified HMAC-based algorithm along with two keys and drops any packets that originate from outsiders. HEAP can be used with multicast, unicast or broadcast applications. We ran several simulations to compare HEAP with existing authentication schemes, such as TESLA, LHAP and Lu and Pooch's algorithm. We measured metrics such as latency, throughput, packet delivery ratio, CPU and memory utilization and show that HEAP performs very well compared to other schemes while guarding against outsider attacks.
KW - Authentication
KW - HEAP
KW - MANETs
KW - Mobile Ad-hoc networks
KW - Security
UR - http://www.scopus.com/inward/record.url?scp=77955022289&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=77955022289&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:77955022289
SN - 1565553128
SN - 9781565553125
T3 - Simulation Series
SP - 157
EP - 165
BT - 10th Communications and Networking Simulation Symposium, CNS 2007, Part of the 2007 Spring Simulation Multiconference, SpringSim 2007
Y2 - 25 March 2007 through 29 March 2007
ER -