Secure Routing with an Integrated Localized Key Management Protocol in MANETs
Title | Secure Routing with an Integrated Localized Key Management Protocol in MANETs |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Talawar, S.H., Maity, S., Hansdah, R.C. |
Conference Name | Advanced Information Networking and Applications (AINA), 2014 IEEE 28th International Conference on |
Date Published | May |
Keywords | Ad hoc networks, authentication, broadcast key distribution mechanism, cryptographic protocols, integrated localized key management protocol, intrusion detection system, Intrusion Detection System (IDS), Key Management, key management protocol, MANET, mobile ad hoc network, mobile ad hoc network (MANET), mobile ad hoc networks, mobile computing, neighbor based handshaking and least common multiple, Public key, public key cryptography, Routing, Routing Protocol, Routing protocols, routing security, Secure Routing |
Abstract | A routing protocol in a mobile ad hoc network (MANET) should be secure against both the outside attackers which do not hold valid security credentials and the inside attackers which are the compromised nodes in the network. The outside attackers can be prevented with the help of an efficient key management protocol and cryptography. However, to prevent inside attackers, it should be accompanied with an intrusion detection system (IDS). In this paper, we propose a novel secure routing with an integrated localized key management (SR-LKM) protocol, which is aimed to prevent both inside and outside attackers. The localized key management mechanism is not dependent on any routing protocol. Thus, unlike many other existing schemes, the protocol does not suffer from the key management - secure routing interdependency problem. The key management mechanism is lightweight as it optimizes the use of public key cryptography with the help of a novel neighbor based handshaking and Least Common Multiple (LCM) based broadcast key distribution mechanism. The protocol is storage scalable and its efficiency is confirmed by the results obtained from simulation experiments. |
URL | http://ieeexplore.ieee.org/document/6838720/ |
DOI | 10.1109/AINA.2014.74 |
Citation Key | 6838720 |
- mobile ad hoc network (MANET)
- Secure Routing
- routing security
- Routing protocols
- Routing Protocol
- Routing
- public key cryptography
- Public key
- neighbor based handshaking and least common multiple
- mobile computing
- mobile ad hoc networks
- Ad hoc networks
- mobile ad hoc network
- MANET
- key management protocol
- key management
- Intrusion Detection System (IDS)
- intrusion detection system
- integrated localized key management protocol
- Cryptographic Protocols
- broadcast key distribution mechanism
- authentication