HEAP: hop-by-hop efficient authentication protocol for Mobile Ad-hoc Networks

  • Authors:
  • Rehan Akbani;Turgay Korkmaz;G. V. S. Raju

  • Affiliations:
  • University of Texas at San Antonio, San Antonio, TX;University of Texas at San Antonio, San Antonio, TX;University of Texas at San Antonio, San Antonio, TX

  • Venue:
  • SpringSim '07 Proceedings of the 2007 spring simulaiton multiconference - Volume 1
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

In Mobile Ad-hoc Networks (MANETs), it is easy to launch various sophisticated attacks such as wormhole, man-in-the-middle and Denial of Service (DoS), or to impersonate another node. To combat such attacks from outsider nodes, we study packet authentication in wireless networks and propose a Hop-by-hop, Efficient Authentication Protocol, called HEAP. HEAP authenticates packets at every hop by using a modified HMAC-based algorithm along with two keys and drops any packets that originate from outsiders. HEAP can be used with multicast, unicast or broadcast applications. We ran several simulations to compare HEAP with existing authentication schemes, such as TESLA, LHAP and Lu and Pooch's algorithm. We measured metrics such as latency, throughput, packet delivery ratio, CPU and memory utilization and show that HEAP performs very well compared to other schemes while guarding against outsider attacks.