A double authentication scheme to detect impersonation attack in link state routing protocols

نویسندگان

  • Dijiang Huang
  • Amit Sinha
  • Deep Medhi
چکیده

In this paper, we present an authentication scheme to prevent impersonation attack in link state routing protocol. The existing authentication schemes are either simple to compute but vulnerable to attacks or too robust against attacks but has exponential computation cost. We introduce a Double Authentication (DA) scheme which provides authentication to the routing information data carried by the link state routing packets. In this scheme every router needs to sign the routing data twice with two different keys using a group keying scheme, which is based on oneway hash function. Based on our performance assessment, we found that this scheme is simpler to implement, computationally efficient and provides the degree of robustness desired with less communication overhead but has higher memory requirement.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A two-phase wormhole attack detection scheme in MANETs

Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...

متن کامل

Prevention of WormholeAttacks in Geographic Routing Protocol

As mobile ad hoc network applications are deployed, security emerges as a central requirement..Position aided routing protocols can offer a significant performance increase over traditional ad hoc routing protocols. Boundary State Routing (BSR) is a geographic routing protocol which routes the data using the location of the nodes. Geographic routing protocols are known to be particularly suscep...

متن کامل

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

Preventive and Corrective Protection for Mobile Ad Hoc Network Routing Protocols

In this paper we describe vulnerabilities and possible protections for mobile ad hoc networks (MANET) routing protocols. Vulnerability and adversary models are built to describe impersonation, fabrication and modification attacks. A security model is proposed, considering both preventive and corrective protection. The basic preventive protection consists of a certificate-based authentication me...

متن کامل

An Efficient Message Authentication Scheme for Link State Routing

We study methods for reducing the cost of secure link state routing. In secure link state routing, routers may need to verify the authenticity of many routing updates, and some routers such as border routers may need to sign many routing updates. Previous work such as public-key based schemes either is very expensive computationally or has certain limitations. This paper presents an efficient s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003