Abstract
Different protocols have been developed throughout the last years to achieve automatic IP address allocation in Mobile Ad hoc Networks (MANETs). However, Autoconfiguration security issues are still an open problem. In this paper, a new secure and robust IP Address allocation protocol for standalone MANETs inspired from MANETconf and named TCSAP is specified and evaluated within NS2. The proposed solution is efficient and thwarts all possible attacks associated with dynamic IP address assignment in MANETs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Buiati, F., Puttini, R.S., de Sousa Jr., R.T.: A Secure Autoconfiguration Protocol for MANET Nodes. In: Nikolaidis, I., Barbeau, M., An, H.-C. (eds.) ADHOC-NOW 2004. LNCS, vol. 3158, pp. 108–121. Springer, Heidelberg (2004)
Cavalli, A., Orset, J.M.: Secure hosts autoconfiguration in mobile ad hoc networks. In: ICDCSW 2004, pp. 809–814 (2004)
Wang, P., Reeves, D.S., Ning, P.: Secure Address Autoconfiguration for Mobile Ad Hoc Networks. In: MOBIQUITOUS 2005, pp. 519–522 (2005)
Hu, S., Mitchell, C.J.: Improving IP Address Autoconfiguration Security in MANETs Using Trust Modelling. In: Jia, X., Wu, J., He, Y. (eds.) MSN 2005. LNCS, vol. 3794, pp. 83–92. Springer, Heidelberg (2005)
Langer, A., Kühnert, T.: Security issues in Address Autoconfiguration Protocols: An improved version of the Optimized Dynamic Address Configuration Protocol. In: archiv.tu-chemnitz.de (2007)
Nesargi, S., Prakash, R.: MANETconf: Configuration of Hosts in a Mobile Ad Hoc Network. In: IEEE INFOCOM (June 2002)
Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing Robust and Ubiquitous Security Support for MANET. In: IEEE International Conference on Network Protocols, pp. 251–260 (November 2001)
Di Crescenzo, G., Arce, G., Ge, R.: Threshold Cryptography in Mobile Ad Hoc Networks. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 91–104. Springer, Heidelberg (2005)
Shamir, A.: How to Share a Secret. Communications of the ACM 22(11), 612–613 (1979)
Pedersen, T.P.: A threshold cryptosystem without a trusted party. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 522–526. Springer, Heidelberg (1991)
Hwang, M., Chang, T.: Threshold Signatures: Current Status and Key Issues. International Journal of Network Security 1(3), 123–137 (2005)
Gouda, M.G.: Elements of Network Protocol Design. John Wiley and Sons, Chichester (1998)
Abdelmalek, A., Feham, M., Taleb-Ahmed, A.: On Recent Security Enhancements to Autoconfiguration Protocols for MANETs: Real Threats and Requirements. IJCSNS 9(4), 401–407 (2009)
The Network Simulator manual, The NS2 homepage, http://www.isi.edu/nsnam/ns
Speed Comparison of Popular Crypto Algorithms, http://www.cryptopp.com
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Abdelmalek, A., Slimane, Z., Feham, M., Taleb-Ahmed, A. (2011). TCSAP: A New Secure and Robust Modified MANETconf Protocol. In: Özcan, A., Zizka, J., Nagamalai, D. (eds) Recent Trends in Wireless and Mobile Networks. CoNeCo WiMo 2011 2011. Communications in Computer and Information Science, vol 162. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21937-5_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-21937-5_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-21936-8
Online ISBN: 978-3-642-21937-5
eBook Packages: Computer ScienceComputer Science (R0)