LIP

a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network

Hung Yuan Hsu, Sencun Zhu, Ali R. Hurson

Research output: Contribution to journalArticle

12 Citations (Scopus)

Abstract

Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to packet injection attacks where a malicious node injects packets into the network with the goal of depleting the resources of the nodes relaying the packets. To prevent such attacks, it is necessary to employ authentication mechanisms that ensure that only authorised nodes can inject traffic into the network. We design a Lightweight Inter-layer Protocol (LIP) for preventing packet injection attacks based on an efficient local broadcast authentication mechanism. In addition to preventing attacks by unauthorised nodes, LIP can also detect and minimise the impersonation attacks by compromised nodes. Through detailed simulation study, we show that LIP is scalable, and it incurs small bandwidth overhead as well as little impact on the traffic delivery ratio even in the case of high node mobility. Moreover, the transparency and independence properties of LIP allows it to be turned on/off as desired and to be integrated seamlessly with secure routing protocols, providing stronger security services for ad hoc networks.

Original languageEnglish (US)
Pages (from-to)202-215
Number of pages14
JournalInternational Journal of Security and Networks
Volume2
Issue number3-4
StatePublished - Jan 1 2007

Fingerprint

Mobile ad hoc networks
Network protocols
Ad hoc networks
Authentication
Routing protocols
Access control
Transparency
Bandwidth

All Science Journal Classification (ASJC) codes

  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Cite this

@article{d1baa25a3b83467bb325d98e3bcdb4c1,
title = "LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network",
abstract = "Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to packet injection attacks where a malicious node injects packets into the network with the goal of depleting the resources of the nodes relaying the packets. To prevent such attacks, it is necessary to employ authentication mechanisms that ensure that only authorised nodes can inject traffic into the network. We design a Lightweight Inter-layer Protocol (LIP) for preventing packet injection attacks based on an efficient local broadcast authentication mechanism. In addition to preventing attacks by unauthorised nodes, LIP can also detect and minimise the impersonation attacks by compromised nodes. Through detailed simulation study, we show that LIP is scalable, and it incurs small bandwidth overhead as well as little impact on the traffic delivery ratio even in the case of high node mobility. Moreover, the transparency and independence properties of LIP allows it to be turned on/off as desired and to be integrated seamlessly with secure routing protocols, providing stronger security services for ad hoc networks.",
author = "Hsu, {Hung Yuan} and Sencun Zhu and Hurson, {Ali R.}",
year = "2007",
month = "1",
day = "1",
language = "English (US)",
volume = "2",
pages = "202--215",
journal = "International Journal of Security and Networks",
issn = "1747-8405",
publisher = "Inderscience Enterprises Ltd",
number = "3-4",

}

LIP : a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network. / Hsu, Hung Yuan; Zhu, Sencun; Hurson, Ali R.

In: International Journal of Security and Networks, Vol. 2, No. 3-4, 01.01.2007, p. 202-215.

Research output: Contribution to journalArticle

TY - JOUR

T1 - LIP

T2 - a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network

AU - Hsu, Hung Yuan

AU - Zhu, Sencun

AU - Hurson, Ali R.

PY - 2007/1/1

Y1 - 2007/1/1

N2 - Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to packet injection attacks where a malicious node injects packets into the network with the goal of depleting the resources of the nodes relaying the packets. To prevent such attacks, it is necessary to employ authentication mechanisms that ensure that only authorised nodes can inject traffic into the network. We design a Lightweight Inter-layer Protocol (LIP) for preventing packet injection attacks based on an efficient local broadcast authentication mechanism. In addition to preventing attacks by unauthorised nodes, LIP can also detect and minimise the impersonation attacks by compromised nodes. Through detailed simulation study, we show that LIP is scalable, and it incurs small bandwidth overhead as well as little impact on the traffic delivery ratio even in the case of high node mobility. Moreover, the transparency and independence properties of LIP allows it to be turned on/off as desired and to be integrated seamlessly with secure routing protocols, providing stronger security services for ad hoc networks.

AB - Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to packet injection attacks where a malicious node injects packets into the network with the goal of depleting the resources of the nodes relaying the packets. To prevent such attacks, it is necessary to employ authentication mechanisms that ensure that only authorised nodes can inject traffic into the network. We design a Lightweight Inter-layer Protocol (LIP) for preventing packet injection attacks based on an efficient local broadcast authentication mechanism. In addition to preventing attacks by unauthorised nodes, LIP can also detect and minimise the impersonation attacks by compromised nodes. Through detailed simulation study, we show that LIP is scalable, and it incurs small bandwidth overhead as well as little impact on the traffic delivery ratio even in the case of high node mobility. Moreover, the transparency and independence properties of LIP allows it to be turned on/off as desired and to be integrated seamlessly with secure routing protocols, providing stronger security services for ad hoc networks.

UR - http://www.scopus.com/inward/record.url?scp=79951648076&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=79951648076&partnerID=8YFLogxK

M3 - Article

VL - 2

SP - 202

EP - 215

JO - International Journal of Security and Networks

JF - International Journal of Security and Networks

SN - 1747-8405

IS - 3-4

ER -