Skip to main content

2019 | OriginalPaper | Buchkapitel

A Trust Based Mutual Authentication and Data Encryption Scheme for MANET Security

verfasst von : Mansoor Ihsan, Martin Hope

Erschienen in: Emerging Technologies in Computing

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

MANET are self-configurable wireless network where the nodes do not have fixed infrastructure, no centralized mechanism, nodes are fully cooperative, highly mobile and dynamic. There is no inherent security between the nodes for secure communication and data exchange. One of the huge security challenges is authentication of nodes in such environment in general and peer communicating nodes in particular where nodes are communicating for the first time.
The proposed scheme presents a novel solution to authenticate peer nodes (source and destination) with no prior trust and security associations. As no pre-established trust exists before the MANET is initialized therefore, in MANET, nodes present a huge challenge of authenticating communicating peer nodes. The proposed scheme provides a solution to authenticate the sending and receiving nodes using trust based scheme as the sender and receiver doesn’t have first-hand information about these trust values as they could be at the opposite end. Thus, the trust is calculated by nodes for all their neighbours and is send to peer communicating nodes when requested before peer nodes initiate communication. We refer to this process as authentication through trust. Lastly, to ensure end to end data encryption, the mutual trust scheme is combined with Diffie-Hellman Elliptic Curve DHEC Key Exchange. This allows nodes pair to exchange data securely by using shared secret keys to encrypt data.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Khan, I.M.S., Midi, D., Khan, M.I., Bertino, E.: Adaptive trust threshold strategy for misbehaving node detection an isolation. In: IEEE Trustcom/BigdataSE/ISPA (2015) Khan, I.M.S., Midi, D., Khan, M.I., Bertino, E.: Adaptive trust threshold strategy for misbehaving node detection an isolation. In: IEEE Trustcom/BigdataSE/ISPA (2015)
2.
Zurück zum Zitat Al-Roubaiey, A., Sheltami, T., Mahmoud, A., Shakshuki, E., Moufta King Fahd, H.: AACK: Adaptive Acknowledgment intrusion detection for MANET with node detection enhancement. In: IEEE International Conference on Advanced Information Networking and Applications (2010) Al-Roubaiey, A., Sheltami, T., Mahmoud, A., Shakshuki, E., Moufta King Fahd, H.: AACK: Adaptive Acknowledgment intrusion detection for MANET with node detection enhancement. In: IEEE International Conference on Advanced Information Networking and Applications (2010)
3.
Zurück zum Zitat Botkar, S., Chaudry, S.R.: An enhanced intrusion detection system using adaptive acknowledgment based algorithm. IEEE (2011) Botkar, S., Chaudry, S.R.: An enhanced intrusion detection system using adaptive acknowledgment based algorithm. IEEE (2011)
5.
Zurück zum Zitat Balakrishnan, K., Deng, J., Varshney, P.K.: TWOACK: preventing selfishness in mobile AdHoc networks. IEEE Communication Society (2005) Balakrishnan, K., Deng, J., Varshney, P.K.: TWOACK: preventing selfishness in mobile AdHoc networks. IEEE Communication Society (2005)
7.
Zurück zum Zitat Buttyan, L., Hubaux, J.-P.: Enforcing service availability in mobile ad-hoc WANs. In: Proceedings of MobiHoc, August 2000 Buttyan, L., Hubaux, J.-P.: Enforcing service availability in mobile ad-hoc WANs. In: Proceedings of MobiHoc, August 2000
8.
Zurück zum Zitat Zhong, S., Chen, J., Yang, Y.R.: Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: Proceedings of INFOCOM, March–April 2003 Zhong, S., Chen, J., Yang, Y.R.: Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: Proceedings of INFOCOM, March–April 2003
9.
Zurück zum Zitat Zapata, M., Asokan, N.: Securing ad hoc routing protocols. In: Proceedings of ACM Workshop on Wireless Security (WiSe), Atlanta, GA, September 2002 Zapata, M., Asokan, N.: Securing ad hoc routing protocols. In: Proceedings of ACM Workshop on Wireless Security (WiSe), Atlanta, GA, September 2002
10.
Zurück zum Zitat Jhaveri, R.H.: MR-AODV: a solution to mitigate blackhole and grayhole attacks in AODV based MANET. In: Third International Conference on Advanced Computing and Communication Technologies. IEEE (2012) Jhaveri, R.H.: MR-AODV: a solution to mitigate blackhole and grayhole attacks in AODV based MANET. In: Third International Conference on Advanced Computing and Communication Technologies. IEEE (2012)
11.
Zurück zum Zitat Anju, J., Sminesh, C.N.: An Improved clustering-based approach for Wormhole attack detection in MANET. In: IEEE 3rd International Conference on Eco-Friendly Computing and Communication Systems (2014) Anju, J., Sminesh, C.N.: An Improved clustering-based approach for Wormhole attack detection in MANET. In: IEEE 3rd International Conference on Eco-Friendly Computing and Communication Systems (2014)
12.
Zurück zum Zitat Yu, M., Su, W.: A secure routing protocol against byzantine attacks for MANETs in adversarial environments. IEEE Trans. Veh. Technol. 58(1), 449–460 (2009)CrossRef Yu, M., Su, W.: A secure routing protocol against byzantine attacks for MANETs in adversarial environments. IEEE Trans. Veh. Technol. 58(1), 449–460 (2009)CrossRef
13.
Zurück zum Zitat Rifquddin, M.R., Sukiswo, M.: Performance of AOMDV routing protocol under rushing and flooding attacks in MANET. In: Proceedings of 20l5 2nd International Conference on Information Technology, Computer and Electrical Engineering (ICITACEE), Indonesia. IEEE, 16–18 October 2015 Rifquddin, M.R., Sukiswo, M.: Performance of AOMDV routing protocol under rushing and flooding attacks in MANET. In: Proceedings of 20l5 2nd International Conference on Information Technology, Computer and Electrical Engineering (ICITACEE), Indonesia. IEEE, 16–18 October 2015
14.
Zurück zum Zitat Hinds, A., Sotiriadis, S., Bessis, N., Antonopoulos, N.: Performance evaluation of security algorithm for AODV MANET routing protocol. In: Third International Conference on Emerging Intelligent Data and Web Technologies. IEEE (2012) Hinds, A., Sotiriadis, S., Bessis, N., Antonopoulos, N.: Performance evaluation of security algorithm for AODV MANET routing protocol. In: Third International Conference on Emerging Intelligent Data and Web Technologies. IEEE (2012)
15.
Zurück zum Zitat Juwad, M.F., Al-Raweshidy, H.S.: Experimental performance comparisons between SAODV and AODV. In: Second Asia International Conference on Modelling and Simulation. IEEE (2008) Juwad, M.F., Al-Raweshidy, H.S.: Experimental performance comparisons between SAODV and AODV. In: Second Asia International Conference on Modelling and Simulation. IEEE (2008)
16.
Zurück zum Zitat Hu, Y., John, D.B., Perrig, A.: SEAD: secure efficient distance vector routing for mobile ad hoc networks. In: Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002). IEEE (2002) Hu, Y., John, D.B., Perrig, A.: SEAD: secure efficient distance vector routing for mobile ad hoc networks. In: Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002). IEEE (2002)
17.
Zurück zum Zitat Perrig, A., Canetti, R., Tygar, J.D., Song, D.: The TESLA broadcast authentication protocol. RSA Lab. 5(2), 2–13 (2002) Perrig, A., Canetti, R., Tygar, J.D., Song, D.: The TESLA broadcast authentication protocol. RSA Lab. 5(2), 2–13 (2002)
18.
Zurück zum Zitat Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: a secure on-demand routing protocol for ad hoc networks. Wirel. Netw. 11(1–2), 21–38 (2005)CrossRef Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: a secure on-demand routing protocol for ad hoc networks. Wirel. Netw. 11(1–2), 21–38 (2005)CrossRef
19.
Zurück zum Zitat Yi, S., Naldurg, P., Kravets, R.: Security-aware ad hoc routing for wireless networks. In: Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 299–302 (2001) Yi, S., Naldurg, P., Kravets, R.: Security-aware ad hoc routing for wireless networks. In: Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 299–302 (2001)
20.
Zurück zum Zitat Carter, S., Yasinsac, A.: Secure position aided ad hoc routing. In: Proceedings of IASTED International Conference on Communication and Computer Networks (CCN 2002), pp. 329– 334 (2002) Carter, S., Yasinsac, A.: Secure position aided ad hoc routing. In: Proceedings of IASTED International Conference on Communication and Computer Networks (CCN 2002), pp. 329– 334 (2002)
23.
Zurück zum Zitat Shakshuki, E.M., Kang, N., Sheltami, T.R.: EAACK—a secure intrusion-detection system for MANETs. IEEE Trans. Ind. Electron. 60(3), 1089–1098 (2013)CrossRef Shakshuki, E.M., Kang, N., Sheltami, T.R.: EAACK—a secure intrusion-detection system for MANETs. IEEE Trans. Ind. Electron. 60(3), 1089–1098 (2013)CrossRef
24.
Zurück zum Zitat Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of MobiCom, August 2000 Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of MobiCom, August 2000
25.
Zurück zum Zitat Nasser, N., Chen, Y.: Enhanced intrusion detection system for discovering malicious nodes in mobile ad hoc networks. Reviewed at IEEE Communication Society Subject Matter Expert for Publication in the ICC 2007 Proceeding (2007) Nasser, N., Chen, Y.: Enhanced intrusion detection system for discovering malicious nodes in mobile ad hoc networks. Reviewed at IEEE Communication Society Subject Matter Expert for Publication in the ICC 2007 Proceeding (2007)
26.
Zurück zum Zitat Buchegger, S., Le Boudec, J.-Y.: Performance analysis of the CONFIDANT protocol: cooperation of nodes, fairness in dynamic ad-hoc networks. In: Proceedings of MobiHoc, June 2002 Buchegger, S., Le Boudec, J.-Y.: Performance analysis of the CONFIDANT protocol: cooperation of nodes, fairness in dynamic ad-hoc networks. In: Proceedings of MobiHoc, June 2002
27.
Zurück zum Zitat Buttyan, K.L., Hubaux, J.-P.: Enforcing service availability in mobile ad-hoc WANs. In: Proceedings of MobiHoc, August 2000 Buttyan, K.L., Hubaux, J.-P.: Enforcing service availability in mobile ad-hoc WANs. In: Proceedings of MobiHoc, August 2000
28.
Zurück zum Zitat Sukiswo, M., Rifquddin R.: Performance of AOMDV routing protocol under rushing and flooding attacks in MANET. In: IEEE 2nd Conference of Information Technology, Computer and Electrical Engineering (ICITACEE), Indonesia, 16–18 October 2015 Sukiswo, M., Rifquddin R.: Performance of AOMDV routing protocol under rushing and flooding attacks in MANET. In: IEEE 2nd Conference of Information Technology, Computer and Electrical Engineering (ICITACEE), Indonesia, 16–18 October 2015
29.
Zurück zum Zitat Rajesh, M., Gnanasekar, M.: Consistently neighbour detection for MANET. In: 2016 IEEE International Conference on Communication and Electronic Systems (ICCES) (2016) Rajesh, M., Gnanasekar, M.: Consistently neighbour detection for MANET. In: 2016 IEEE International Conference on Communication and Electronic Systems (ICCES) (2016)
30.
Zurück zum Zitat Carter, S., Yasinsac, A.: Secure position aided ad hoc routing. In: Proceedings of IASTED International Conference on Communication and Computer Networks (CCN 2002), pp. 329–334 (2002) Carter, S., Yasinsac, A.: Secure position aided ad hoc routing. In: Proceedings of IASTED International Conference on Communication and Computer Networks (CCN 2002), pp. 329–334 (2002)
31.
Zurück zum Zitat Zhong, S., Chen, J., Yang, Y.R.: Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: Proceedings of INFOCOM (2003) Zhong, S., Chen, J., Yang, Y.R.: Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: Proceedings of INFOCOM (2003)
32.
Zurück zum Zitat Wong, Y., Ramamurthy, B., Zou, X.: The performance of elliptic curve based group Diffie-Hellman protocols for secure group communication over ad hoc networks. In: IEEE International Conference on Communication (2006) Wong, Y., Ramamurthy, B., Zou, X.: The performance of elliptic curve based group Diffie-Hellman protocols for secure group communication over ad hoc networks. In: IEEE International Conference on Communication (2006)
34.
Zurück zum Zitat Gajbhiya, S., Karmakar, S., Sharma, M.: Diffie-Hellman key agreement with elliptic curve discrete logarithm problem. Int. J. Comput. Appl. 129(12), 25–27 (2015) Gajbhiya, S., Karmakar, S., Sharma, M.: Diffie-Hellman key agreement with elliptic curve discrete logarithm problem. Int. J. Comput. Appl. 129(12), 25–27 (2015)
Metadaten
Titel
A Trust Based Mutual Authentication and Data Encryption Scheme for MANET Security
verfasst von
Mansoor Ihsan
Martin Hope
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-23943-5_7