Abstract
Secure routing (SR) is one of the most important issues in Mobile Ad hoc Networks (MANETs). Recently, in 2013, Zhao et al. proposed an efficient routing integrated framework for MANETs. They claimed that their proposed scheme distributes the system parameter only to the authenticate nodes before network set up phase. However, based on cryptanalysis, we have found that an unauthenticated nodes are also be able to get that original system parameter and behave like a malicious node in the network. Thus, their scheme fails to provide an authenticate distribution mechanism in real life application. As a counter measurement, this paper aims to present an efficient authenticated distribution mechanism that can be incorporated very efficiently in their scheme. Our proposed technique is found to be secure under the hardness of Computational Diffie-Hellman (CDH) assumption.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
P. Michiardi, R. Molva, Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks, in Advanced communications and multimedia security (Springer, 2002), pp. 107–121
S. Buchegger, J.-Y. Le Boudec, Performance analysis of the confidant protocol, in Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing (ACM, 2002), pp. 226–236
D. Coppersmith, M. Jakobsson, Almost optimal hash sequence traversal, in Financial Cryptography (Springer, 2002), pp 102–119
Ralf Hauser, Tony Przygienda, Gene Tsudik, Lowering security overhead in link state routing. Comput. Netw. 31(8), 885–894 (1999)
D.B. Johnson, Routing in ad hoc networks of mobile hosts, in First Workshop on Mobile Computing Systems and Applications, WMCSA 1994. (IEEE, 1994), pp. 158–163
W. Su, M. Gerla, Ipv6 flow handoff in ad hoc wireless networks using mobility prediction, inGlobal Telecommunications Conference, 1999. GLOBECOM’99, vol. 1 (IEEE, 1999), pp 271–275
T. Clausen, P. Jacquet, C. Adjih, A. Laouiti, P. Minet, P. Muhlethaler, A. Qayyum, L. Viennot, Optimized link state routing protocol (olsr) (2003)
C.E. Perkins, P. Bhagwat, Highly dynamic destination-sequenced distance-vector routing (dsdv) for mobile computers, in textitACM SIGCOMM Computer Communication Review, vol. 24 (ACM, 1994), pp. 234–244
D.B Johnson, The dynamic source routing protocol for mobile ad hoc networks. draft-ietf-manet-dsr-09.txt (2003)
E.M. Royer, C.E. Perkins, Multicast operation of the ad-hoc on-demand distance vector routing protocol, in Proceedings of the 5th annual ACM/IEEE International Conference on Mobile Computing and Networking (ACM, 1999), pp. 207–218
Z.J. Haas, M.R. Pearlman, P. Samar, The zone routing protocol (zrp) for ad hoc networks (2002)
D. Boneh, M. Franklin, Identity-based encryption from the weil pairing, in Advances in Cryptology CRYPTO 2001 (Springer, 2001), pp. 213–229
Muhammad Bohio, Ali Miri, Efficient identity-based security schemes for ad hoc network routing protocols. Ad hoc Netw. 2(3), 309–317 (2004)
S. Zhao, R. Kent, A. Aggarwal, A key management and secure routing integrated framework for mobile ad-hoc networks. Ad Hoc Netw. 11(3), 1046–1061 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Ranjan, R. (2017). Cryptanalysis of Secure Routing Among Authenticated Nodes in MANETs. In: Satapathy, S., Bhateja, V., Udgata, S., Pattnaik, P. (eds) Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications . Advances in Intelligent Systems and Computing, vol 516. Springer, Singapore. https://doi.org/10.1007/978-981-10-3156-4_23
Download citation
DOI: https://doi.org/10.1007/978-981-10-3156-4_23
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-3155-7
Online ISBN: 978-981-10-3156-4
eBook Packages: EngineeringEngineering (R0)