Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 516))

  • 928 Accesses

Abstract

Secure routing (SR) is one of the most important issues in Mobile Ad hoc Networks (MANETs). Recently, in 2013, Zhao et al. proposed an efficient routing integrated framework for MANETs. They claimed that their proposed scheme distributes the system parameter only to the authenticate nodes before network set up phase. However, based on cryptanalysis, we have found that an unauthenticated nodes are also be able to get that original system parameter and behave like a malicious node in the network. Thus, their scheme fails to provide an authenticate distribution mechanism in real life application. As a counter measurement, this paper aims to present an efficient authenticated distribution mechanism that can be incorporated very efficiently in their scheme. Our proposed technique is found to be secure under the hardness of Computational Diffie-Hellman (CDH) assumption.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 379.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. P. Michiardi, R. Molva, Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks, in Advanced communications and multimedia security (Springer, 2002), pp. 107–121

    Google Scholar 

  2. S. Buchegger, J.-Y. Le Boudec, Performance analysis of the confidant protocol, in Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing (ACM, 2002), pp. 226–236

    Google Scholar 

  3. D. Coppersmith, M. Jakobsson, Almost optimal hash sequence traversal, in Financial Cryptography (Springer, 2002), pp 102–119

    Google Scholar 

  4. Ralf Hauser, Tony Przygienda, Gene Tsudik, Lowering security overhead in link state routing. Comput. Netw. 31(8), 885–894 (1999)

    Article  Google Scholar 

  5. D.B. Johnson, Routing in ad hoc networks of mobile hosts, in First Workshop on Mobile Computing Systems and Applications, WMCSA 1994. (IEEE, 1994), pp. 158–163

    Google Scholar 

  6. W. Su, M. Gerla, Ipv6 flow handoff in ad hoc wireless networks using mobility prediction, inGlobal Telecommunications Conference, 1999. GLOBECOM’99, vol. 1 (IEEE, 1999), pp 271–275

    Google Scholar 

  7. T. Clausen, P. Jacquet, C. Adjih, A. Laouiti, P. Minet, P. Muhlethaler, A. Qayyum, L. Viennot, Optimized link state routing protocol (olsr) (2003)

    Google Scholar 

  8. C.E. Perkins, P. Bhagwat, Highly dynamic destination-sequenced distance-vector routing (dsdv) for mobile computers, in textitACM SIGCOMM Computer Communication Review, vol. 24 (ACM, 1994), pp. 234–244

    Google Scholar 

  9. D.B Johnson, The dynamic source routing protocol for mobile ad hoc networks. draft-ietf-manet-dsr-09.txt (2003)

    Google Scholar 

  10. E.M. Royer, C.E. Perkins, Multicast operation of the ad-hoc on-demand distance vector routing protocol, in Proceedings of the 5th annual ACM/IEEE International Conference on Mobile Computing and Networking (ACM, 1999), pp. 207–218

    Google Scholar 

  11. Z.J. Haas, M.R. Pearlman, P. Samar, The zone routing protocol (zrp) for ad hoc networks (2002)

    Google Scholar 

  12. D. Boneh, M. Franklin, Identity-based encryption from the weil pairing, in Advances in Cryptology CRYPTO 2001 (Springer, 2001), pp. 213–229

    Google Scholar 

  13. Muhammad Bohio, Ali Miri, Efficient identity-based security schemes for ad hoc network routing protocols. Ad hoc Netw. 2(3), 309–317 (2004)

    Article  Google Scholar 

  14. S. Zhao, R. Kent, A. Aggarwal, A key management and secure routing integrated framework for mobile ad-hoc networks. Ad Hoc Netw. 11(3), 1046–1061 (2013)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rajeev Ranjan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Ranjan, R. (2017). Cryptanalysis of Secure Routing Among Authenticated Nodes in MANETs. In: Satapathy, S., Bhateja, V., Udgata, S., Pattnaik, P. (eds) Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications . Advances in Intelligent Systems and Computing, vol 516. Springer, Singapore. https://doi.org/10.1007/978-981-10-3156-4_23

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3156-4_23

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3155-7

  • Online ISBN: 978-981-10-3156-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics