Skip to main content

A Variant of Merkle Signature Scheme to Protect AODV Routing Protocol

  • Conference paper
Recent Trends in Wireless and Mobile Networks (WiMo 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 84))

Included in the following conference series:

Abstract

Wireless mobile Ad-Hoc networks (MANETs) are networks of mobile nodes with no fixed infrastructures. Their peer-to-peer communication architectures over shared wireless medium with no clear line of defense pose a number of challenges to security design. Some previous works have used a form of digital signature for protection. However, there are still limitations in the implementation. This paper proposes a variant of the Merkle Signature Scheme (MSS) to protect an Ad-Hoc On-demand Distance Vector (AODV) protocol, a common routing protocol for MANETs. The new protocol is named Extra Secure AODV or ESAODV in short. ESAODV provides hop-count protection, digital signature and protocol enforcement. Through these features several security benefits on the routing packets have been established, namely fast authentication, integrity, and non-repudiation. Several experiments have been conducted using different digital signatures of the MSS variant signatures. The result shows that ESAODV is effective for combating routing attacks, and works properly although the malicious are 20% of the nodes total number in MANETs. In terms of features, ESAODV are also far superior than secure AODV (SAODV) and Authenticated Routing for Ad hoc Networks (ARAN).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hallgren, S., Vollmer, U.: Quantum Computing. In: Bernstein, D.J., Buch-mann, J., Dahmen, E. (eds.) Post-Quantum Cryptography Book Chapter. Springer, Heidelberg (2009)

    Google Scholar 

  2. Lamport, L.: Password authentication with insecure communication. Communications of the ACM 24(11), 770–772 (1981)

    Article  MathSciNet  Google Scholar 

  3. Merkle, R.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)

    Google Scholar 

  4. Buchmann, J., Garcia, L.C.C., Dahmen, E., Döring, M., Klintsevich, E.: CMSS - an improved Merkle signature scheme. In: Barua, R., Lange, T. (eds.) INDOCRYPT 2006. LNCS, vol. 4329, pp. 349–363. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  5. Perkins, C.E., Royer, E.M., Das, S.R.: Ad Hoc On-Demand Distance Vector (AODV) Routing. IETF INTERNET DRAFT, MANET working group, Draft-ietfmanet-aodv-13.txt (2003)

    Google Scholar 

  6. Kurosawa, S., et al.: Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method. International Journal of Network Security 5(3), 338–346 (2007)

    Google Scholar 

  7. Zhen, J., Srinivas, S.: Preventing Replay Attacks for Secure Routing in Ad Hoc Networks. In: Pierre, S., Barbeau, M., Kranakis, E. (eds.) ADHOC-NOW 2003. LNCS, vol. 2865, pp. 140–150. Springer, Heidelberg (2003)

    Google Scholar 

  8. Mandala, S., Ngadi, M.A., Abdullah, A.H.: A Survey on MANET Intrusion Detection. The International Journal of Computer Science and Security 2(1) (2008) ISSN:1985-1533

    Google Scholar 

  9. Hu, Y., Perrig, A., Johnson, D.: Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. In: Proceedings of IEEE INFOCOM 2003 (2003)

    Google Scholar 

  10. Zapata, M.G.: Key Management and Delayed Verification for Ad. Hoc Networks. Journal of High Speed Networks 15(1), 93–109 (2006)

    MathSciNet  Google Scholar 

  11. Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.: A Secure Routing Protocol for Ad hoc Networks. In: Proc. of IEEE International Conference on Network Protocols (ICNP), pp. 78–89 (2002)

    Google Scholar 

  12. Barr, R., Haas, Z.J., Renesse, R.V.: Jist: An efficient approach to simulation using virtual machines. Software. Practice & Experience 35(6), 539–576 (2005)

    Article  Google Scholar 

  13. Barr, R., Haas, Z.J., Renesse, R.V.: Scalable Wireless Ad Hoc Network Simulation. In: Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad hoc Wireless, and Peer-to-Peer Networks, Auerbach, ch. 19, pp. 297–311 (2005)

    Google Scholar 

  14. Buchmann, J., Coronado, C., Doring, M., Engelbert, D., Ludwig, C., Overberck, R., Schimidt, A., Vollmer, U.: Post-Quantum signatures (2004) (Preprint)

    Google Scholar 

  15. Stainwandt, R., Villany, V.I.: A one-time signature using run-length encoding. J. Information Processing Letters 108, 179–185 (2008)

    Article  Google Scholar 

  16. Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Computing 26, 1484–1509 (1997)

    Article  MATH  MathSciNet  Google Scholar 

  17. Vandersypen, L.M.K., Steffen, M., Breyta, G., Yannoni, C.S., Sherwood, M.H., Chuang, I.L.: Experimental realization of shor’s quantum factoring algorithm using nuclear magnetic resonance. Nature 414, 883–887 (2001)

    Article  Google Scholar 

  18. Buchmann, J., et al.: Merkle signatures with virtually unlimited signature capacity. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 31–45. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  19. Bennet, C.H., Bernstein, E.: Strenghsts and waknesses fo quantum computing. SIAM J. Comput. 26(5), 1510–1523 (1997)

    Article  MathSciNet  Google Scholar 

  20. Cerri, D., Ghioni, A.: Securing AODV: The A-SAODV Secure Routing Prototype. IEEE Communications Magazine (2008)

    Google Scholar 

  21. Bouncy Castle Provider, http://www.bouncycastle.org

  22. FlexiProvider, http://www.cdc.informatik.tu-darmstadt.de/flexiprovider/

  23. Courtois, N., Goubin, L., Patarin., J.: SFLASH, a Fast Asymmetric Signature Scheme for low-cost Smartcards – Primitive Specification and Supporting Documentation, http://www.minrank.org/sflash-b-v2.pdf

  24. Tan, J., Chen, J., Liu, Y.: An Efficient Authentication Strategy for Reprogramming of Sensor Networks. In: Int. conference on Computational Intelligence and Security (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mandala, S., Ngadi, M.A., Abdullah, A.H., Ismail, A.S. (2010). A Variant of Merkle Signature Scheme to Protect AODV Routing Protocol. In: Özcan, A., Chaki, N., Nagamalai, D. (eds) Recent Trends in Wireless and Mobile Networks. WiMo 2010. Communications in Computer and Information Science, vol 84. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14171-3_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14171-3_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14170-6

  • Online ISBN: 978-3-642-14171-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics