@article{418fb27d3676465ca64e785918bf258e,
title = "LHAP: A lightweight network access control protocol for ad hoc networks",
abstract = "Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the network with the goal of depleting the resources of the nodes relaying the packets. To thwart or prevent such attacks, it is necessary to employ authentication mechanisms to ensure that only authorized nodes can inject traffic into the network. We propose LHAP, a hop-by-hop authentication protocol for ad hoc networks. LHAP resides in between the network layer and the data link layer, thus providing a layer of protection that can prevent or thwart many attacks from happening, including outsider attacks and insider impersonation attacks. Our detailed performance evaluation shows that LHAP incurs small performance overhead and it also allows a tradeoff between security and performance.",
author = "Sencun Zhu and Shouhuai Xu and Sanjeev Setia and Sushil Jajodia",
note = "Funding Information: In this paper, we have presented LHAP, a lightweight hop-by-hop authentication protocol for network access control in ad hoc networks. LHAP is based on two techniques: (i) hop-by-hop authentication for verifying the authenticity of all the packets transmitted in the network and (ii) one-way key chain and TESLA for packet authentication and for reducing the overhead for establishing trust among nodes. The design of LHAP is transparent to and independent of the routing protocols. Through a detailed simulation study, we show that LHAP is efficient and allows a tradeoff between security and performance. In the future, we will investigate new solutions that do not rely on TESLA. Sencun Zhu is an assistant professor in Department of Computer Science and Engineering and School of Information Science and Technology, the Pennsylvania State University. He received the Ph.D. degree in Information Technology from George Mason University in 2004. His research interests include network and systems security, ad hoc and sensor networks, and peer-to-peer computing. Shouhuai Xu is an assistant professor at the University of Texas, San Antonio. His research interests include provable security of cryptographic constructs, security of mobile ad hoc networks and sensor networks, and privacy-preserving distributed computing. Sanjeev Setia received the M.Sc. (Tech.) degree from BITS, Pilani, India in 1987, and the M.S. and Ph.D. degrees in computer science from the University of Maryland, College Park in 1990 and 1993 respectively. He is currently an associate professor in the Department of Computer Science at George Mason University. His current research interests are in multicast security, ad hoc networks, peer to peer computing, and performance evaluation of computer systems. Sushil Jajodia is BDM International Professor of Information Technology and the director of Center for Secure Information Systems at the George Mason University, Fairfax, Virginia. He served as the chair of the Department of Information and Software Engineering during 1998–2002. He joined GMU after serving as the director of the Database and Expert Systems Program at the National Science Foundation. Before that he was the head of the Database and Distributed Systems Section at the Naval Research Laboratory, Washington. He has also been a visiting professor at the University of Milan and University of Rome “La Sapienza”, Italy and at the Isaac Newton Institute for Mathematical Sciences, Cambridge University, England. He received his Ph.D. from the University of Oregon, Eugene. He has authored five books, edited twenty two books, and published more than 250 technical papers in the refereed journals and conference proceedings. He received the 1996 Kristian Beckman award from IFIP TC 11 for his contributions to the discipline of Information Security, and the 2000 Outstanding Research Faculty Award from GMU{\textquoteright}s School of Information Technology and Engineering. He has served in different capacities for various journals and conferences. He is the founding editor-in-chief of the Journal of Computer Security and on the editorial boards of ACM Transactions on Information and Systems Security, International Journal of Cooperative Information Systems, and International Journal of Information and Computer Security. He is the consulting editor of the Kluwer International Series on Advances in Information Security. He also serves as the chair of the ACM Special Interest Group on Security, Audit, and Control (SIGSAC) and the IFIP WG 11.5 on Systems Integrity and Control. The URL for his web page is http://csis.gmu.edu/faculty/jajodia.html . ",
year = "2006",
month = sep,
doi = "10.1016/j.adhoc.2005.06.002",
language = "English (US)",
volume = "4",
pages = "567--585",
journal = "Ad Hoc Networks",
issn = "1570-8705",
publisher = "Elsevier B.V.",
number = "5",
}