Abstract
Wireless mobile Ad-Hoc networks (MANETs) are networks of mobile nodes with no fixed infrastructures. Their peer-to-peer communication architectures over shared wireless medium with no clear line of defense pose a number of challenges to security design. Some previous works have used a form of digital signature for protection. However, there are still limitations in the implementation. This paper proposes a variant of the Merkle Signature Scheme (MSS) to protect an Ad-Hoc On-demand Distance Vector (AODV) protocol, a common routing protocol for MANETs. The new protocol is named Extra Secure AODV or ESAODV in short. ESAODV provides hop-count protection, digital signature and protocol enforcement. Through these features several security benefits on the routing packets have been established, namely fast authentication, integrity, and non-repudiation. Several experiments have been conducted using different digital signatures of the MSS variant signatures. The result shows that ESAODV is effective for combating routing attacks, and works properly although the malicious are 20% of the nodes total number in MANETs. In terms of features, ESAODV are also far superior than secure AODV (SAODV) and Authenticated Routing for Ad hoc Networks (ARAN).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Hallgren, S., Vollmer, U.: Quantum Computing. In: Bernstein, D.J., Buch-mann, J., Dahmen, E. (eds.) Post-Quantum Cryptography Book Chapter. Springer, Heidelberg (2009)
Lamport, L.: Password authentication with insecure communication. Communications of the ACM 24(11), 770–772 (1981)
Merkle, R.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)
Buchmann, J., Garcia, L.C.C., Dahmen, E., Döring, M., Klintsevich, E.: CMSS - an improved Merkle signature scheme. In: Barua, R., Lange, T. (eds.) INDOCRYPT 2006. LNCS, vol. 4329, pp. 349–363. Springer, Heidelberg (2006)
Perkins, C.E., Royer, E.M., Das, S.R.: Ad Hoc On-Demand Distance Vector (AODV) Routing. IETF INTERNET DRAFT, MANET working group, Draft-ietfmanet-aodv-13.txt (2003)
Kurosawa, S., et al.: Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method. International Journal of Network Security 5(3), 338–346 (2007)
Zhen, J., Srinivas, S.: Preventing Replay Attacks for Secure Routing in Ad Hoc Networks. In: Pierre, S., Barbeau, M., Kranakis, E. (eds.) ADHOC-NOW 2003. LNCS, vol. 2865, pp. 140–150. Springer, Heidelberg (2003)
Mandala, S., Ngadi, M.A., Abdullah, A.H.: A Survey on MANET Intrusion Detection. The International Journal of Computer Science and Security 2(1) (2008) ISSN:1985-1533
Hu, Y., Perrig, A., Johnson, D.: Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. In: Proceedings of IEEE INFOCOM 2003 (2003)
Zapata, M.G.: Key Management and Delayed Verification for Ad. Hoc Networks. Journal of High Speed Networks 15(1), 93–109 (2006)
Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.: A Secure Routing Protocol for Ad hoc Networks. In: Proc. of IEEE International Conference on Network Protocols (ICNP), pp. 78–89 (2002)
Barr, R., Haas, Z.J., Renesse, R.V.: Jist: An efficient approach to simulation using virtual machines. Software. Practice & Experience 35(6), 539–576 (2005)
Barr, R., Haas, Z.J., Renesse, R.V.: Scalable Wireless Ad Hoc Network Simulation. In: Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad hoc Wireless, and Peer-to-Peer Networks, Auerbach, ch. 19, pp. 297–311 (2005)
Buchmann, J., Coronado, C., Doring, M., Engelbert, D., Ludwig, C., Overberck, R., Schimidt, A., Vollmer, U.: Post-Quantum signatures (2004) (Preprint)
Stainwandt, R., Villany, V.I.: A one-time signature using run-length encoding. J. Information Processing Letters 108, 179–185 (2008)
Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Computing 26, 1484–1509 (1997)
Vandersypen, L.M.K., Steffen, M., Breyta, G., Yannoni, C.S., Sherwood, M.H., Chuang, I.L.: Experimental realization of shor’s quantum factoring algorithm using nuclear magnetic resonance. Nature 414, 883–887 (2001)
Buchmann, J., et al.: Merkle signatures with virtually unlimited signature capacity. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 31–45. Springer, Heidelberg (2007)
Bennet, C.H., Bernstein, E.: Strenghsts and waknesses fo quantum computing. SIAM J. Comput. 26(5), 1510–1523 (1997)
Cerri, D., Ghioni, A.: Securing AODV: The A-SAODV Secure Routing Prototype. IEEE Communications Magazine (2008)
Bouncy Castle Provider, http://www.bouncycastle.org
FlexiProvider, http://www.cdc.informatik.tu-darmstadt.de/flexiprovider/
Courtois, N., Goubin, L., Patarin., J.: SFLASH, a Fast Asymmetric Signature Scheme for low-cost Smartcards – Primitive Specification and Supporting Documentation, http://www.minrank.org/sflash-b-v2.pdf
Tan, J., Chen, J., Liu, Y.: An Efficient Authentication Strategy for Reprogramming of Sensor Networks. In: Int. conference on Computational Intelligence and Security (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mandala, S., Ngadi, M.A., Abdullah, A.H., Ismail, A.S. (2010). A Variant of Merkle Signature Scheme to Protect AODV Routing Protocol. In: Özcan, A., Chaki, N., Nagamalai, D. (eds) Recent Trends in Wireless and Mobile Networks. WiMo 2010. Communications in Computer and Information Science, vol 84. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14171-3_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-14171-3_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14170-6
Online ISBN: 978-3-642-14171-3
eBook Packages: Computer ScienceComputer Science (R0)