Hash Chains to Secure Proactive Protocols

被引:0
|
作者
Bouabana-Tebibel, Thouraya [1 ]
Ayad, Khadidja [1 ]
机构
[1] Ecole Natl Super Informat ESI, LCSI, Algiers, Algeria
关键词
Mobile ad hoc network; routing; security; authentication; hash chains; wormhole attack;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Several secure extensions have been proposed to deal with the OLSR proactive routing protocol security, but they often involve a very high resource consumption that degrades network performances. The protocol ADVSIG is one of these extensions. It presents an efficient security approach, but generates very high computational costs due to the cryptographic operations it performs on the control messages. In this paper, we present a secure mechanism for OLSR, based on ADVSIG protocol, that we call ADVHCA. Its, purpose is to improve ADVSIG performances using hash chains to reduce the cost of securing HELLO control messages. A watching mechanism is also proposed to counter the wormhole attack. The whole solution is simulated and analyzed using NS2.
引用
收藏
页码:62 / 68
页数:7
相关论文
共 50 条
  • [1] Secure Hash-based Search Protocols for RFID Systems
    He Jialiang
    Xu Zhiqiang
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2013, 6 (04): : 49 - 59
  • [2] Authentication and micropayment protocols based on self-updating hash chains
    Chen, Li
    Zhang, Haojun
    Liu, Nan
    SIXTH INTERNATIONAL CONFERENCE ON GRID AND COOPERATIVE COMPUTING, PROCEEDINGS, 2007, : 467 - +
  • [3] T/Key: Second-Factor Authentication From Secure Hash Chains
    Kogan, Dmitry
    Manohar, Nathan
    Boneh, Dan
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 983 - 999
  • [4] A secure credit-based cooperation stimulating mechanism for MANETs using hash chains
    Janzadeh, Hamed
    Fayazbakhsh, Kaveh
    Dehghan, Mehdi
    Fallah, Mehran S.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2009, 25 (08): : 926 - 934
  • [5] Determining Minimum Hash Width for Hash Chains
    Dietzfelbinger, Martin
    Keller, Joerg
    THIRD CENTRAL EUROPEAN CYBERSECURITY CONFERENCE (CECC 2019), 2019,
  • [6] Hierarchical key establishment protocols based on secure keyed one-way hash functions
    Ku, WC
    Wang, SD
    TWELFTH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN-12), PROCEEDINGS, 1998, : 162 - 167
  • [7] SHA - THE SECURE HASH ALGORITHM
    STALLINGS, W
    DR DOBBS JOURNAL, 1994, 19 (04): : 32 - &
  • [8] On Fast Verification of Hash Chains
    Yum, Dae Hyun
    Kim, Jin Seok
    Lee, Pil Joong
    Hong, Sung Je
    TOPICS IN CRYPTOLOGY - CT-RSA 2010, PROCEEDINGS, 2010, 5985 : 382 - 396
  • [9] Fast verification of hash chains
    Fischlin, M
    TOPICS IN CRYPTOLOGY - CT-RSA 2004, PROCEEDINGS, 2004, 2964 : 339 - 352
  • [10] A Secure Scheme of Continuity Based on Two-Dimensional Backward Hash Key Chains for Sensor Networks
    Li, Sujun
    Zhou, Boqing
    Dai, Jingguo
    Sun, Xingming
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2012, 1 (05) : 416 - 419