Visible to the public Secure Routing with an Integrated Localized Key Management Protocol in MANETs

TitleSecure Routing with an Integrated Localized Key Management Protocol in MANETs
Publication TypeConference Paper
Year of Publication2014
AuthorsTalawar, S.H., Maity, S., Hansdah, R.C.
Conference NameAdvanced Information Networking and Applications (AINA), 2014 IEEE 28th International Conference on
Date PublishedMay
KeywordsAd hoc networks, authentication, broadcast key distribution mechanism, cryptographic protocols, integrated localized key management protocol, intrusion detection system, Intrusion Detection System (IDS), Key Management, key management protocol, MANET, mobile ad hoc network, mobile ad hoc network (MANET), mobile ad hoc networks, mobile computing, neighbor based handshaking and least common multiple, Public key, public key cryptography, Routing, Routing Protocol, Routing protocols, routing security, Secure Routing
Abstract

A routing protocol in a mobile ad hoc network (MANET) should be secure against both the outside attackers which do not hold valid security credentials and the inside attackers which are the compromised nodes in the network. The outside attackers can be prevented with the help of an efficient key management protocol and cryptography. However, to prevent inside attackers, it should be accompanied with an intrusion detection system (IDS). In this paper, we propose a novel secure routing with an integrated localized key management (SR-LKM) protocol, which is aimed to prevent both inside and outside attackers. The localized key management mechanism is not dependent on any routing protocol. Thus, unlike many other existing schemes, the protocol does not suffer from the key management - secure routing interdependency problem. The key management mechanism is lightweight as it optimizes the use of public key cryptography with the help of a novel neighbor based handshaking and Least Common Multiple (LCM) based broadcast key distribution mechanism. The protocol is storage scalable and its efficiency is confirmed by the results obtained from simulation experiments.

URLhttp://ieeexplore.ieee.org/document/6838720/
DOI10.1109/AINA.2014.74
Citation Key6838720