A new family of authentication protocols
ACM SIGOPS Operating Systems Review
Password authentication with insecure communication
Communications of the ACM
Hop integrity in computer networks
IEEE/ACM Transactions on Networking (TON)
A Digital Signature Based on a Conventional Encryption Function
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Reducing The Cost Of Security In Link-State Routing
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks
ICDCSW '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
An efficient message authentication scheme for link state routing
ACSAC '97 Proceedings of the 13th Annual Computer Security Applications Conference
A Lightweight Authentication Protocol for Mobile Ad Hoc Networks
ITCC '05 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II - Volume 02
Practical Broadcast Authentication in Sensor Networks
MOBIQUITOUS '05 Proceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
Reliable broadcast message authentication in wireless sensor networks
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Statistical en-route filtering of injected false data in sensor networks
IEEE Journal on Selected Areas in Communications
Public Key Signatures and Lightweight Security Solutions in a Wireless Environment
NEW2AN '09 and ruSMART '09 Proceedings of the 9th International Conference on Smart Spaces and Next Generation Wired/Wireless Networking and Second Conference on Smart Spaces
Security design for an inter-domain publish/subscribe architecture
The future internet
Proceedings of the first ACM international symposium on Design and analysis of intelligent vehicular networks and applications
Joint authentication and quality of service provisioning in cooperative communication networks
Computer Communications
Proceedings of the second ACM international symposium on Design and analysis of intelligent vehicular networks and applications
Hi-index | 0.00 |
Wireless multi-hop networks are particularly susceptible to attacks based on flooding and the interception, tampering with, and forging of packets. Thus, reliable communication in such networks quintessentially depends on mechanisms to verify the authenticity of network traffic and the identity of communicating peers. A major challenge to achieve this functionality are the tight resource constraints of such devices as smartphones, mesh- and sensor nodes with regard to CPU, memory, and energy. Since existing approaches suffer from significant drawbacks related to functionality and efficiency, we present in this paper ALPHA, an Adaptive and Lightweight Protocol for Hop-by-hop Authentication. ALPHA establishes a verifiable notion of identity for network traffic, based on computationally cheap hash functions, enabling end-to-end as well as hop-by-hop integrity protection for unicast traffic. Our evaluation shows that ALPHA is a generic security mechanism that makes full traffic authentication and secure middlebox signaling viable in resource-constrainted multi-hop networks.