Authentication in Wireless Networks

With the explosive growth in the adoption of wireless networks in the recent years, the limitations of wireless security have become a topic of wide spread concern. It is easy for hackers to enter or leave a wireless network. They can directly attack the network and inject spurious packets, tamper with packets, drop packets, or impersonate another node. This violates the network's goals of availability, integrity and authentication. This paper presents an authentication scheme for mobile ad hoc networks (MANETs) that is designed to combat such attacks from adversaries. In this scheme, every packet is authenticated at every node. The performance of the proposed scheme is compared with other published schemes and it is found to be just as efficient while improving on security

[1]  William A. Arbaugh,et al.  Toward secure key distribution in truly ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[2]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[3]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[4]  Shouhuai Xu,et al.  LHAP: a lightweight hop-by-hop authentication protocol for ad-hoc networks , 2003, 23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings..

[5]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[6]  Hugo Krawczyk,et al.  Keying Hash Functions for Message Authentication , 1996, CRYPTO.

[7]  Ran Canetti,et al.  Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[8]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[9]  Haiyun Luo,et al.  Self-securing ad hoc wireless networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.

[10]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[11]  Udo W. Pooch,et al.  A lightweight authentication protocol for mobile ad hoc networks , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[12]  G.V.S. Raju,et al.  Routing in ad hoc networks , 2002, IEEE International Conference on Systems, Man and Cybernetics.

[13]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[14]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.

[15]  Yvo Desmedt,et al.  Some Recent Research Aspects of Threshold Cryptography , 1997, ISW.

[16]  Rehan Akbani,et al.  Elliptic curve cryptosystem and its applications , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).

[17]  Victor C. M. Leung,et al.  Secure Routing for Mobile Ad Hoc Networks , 2006 .