Enhancing the Security of MANETs using Hash Algorithms

Abstract Hash functions are used in information security applications for the generation and verification of digital signatures, key derivation, and pseudorandom bit generation. Hash algorithms are secure because, for a given algorithm, it is computationally infeasible to find a message that corresponds to a given message digest, or to find two different messages that produce the same message digest. Any change to a message will result in a different message digest with a very high probability. This will result in a verification failure when the secure hash algorithm is used with a digital signature algorithm or a keyed-hash message authentication algorithm. In our work, first we implemented the Zone Routing Protocol (ZRP), a hybrid MANET protocol is being implemented in Network Simulator 2 (NS2) and hashing algorithm, keyed-Hash Message Authentication Code – Secure Hashing Algorithm 512 (HMAC-SHA512) is implemented for the Authentication and Data Integrity of the information being sent. In addition to that a Trust-Based system is formulated for preventing the Denial-of-Services (DoS) Attacks. The first part of this paper introduces the HMAC-SHA512 for ensuring that the data packets are received by the destination only and in its original form but at the expense of the increased processing time at the source and the destination. The second part uses the Trust-Based system with those nodes that act maliciously being broadcasted in the network and isolated to render a higher throughput and packet delivery fraction but at the expense of the increased end to end delay.

[1]  C. Siva Ram Murthy,et al.  Ad Hoc Wireless Networks: Architectures and Protocols , 2004 .

[2]  Zygmunt J. Haas,et al.  The Bordercast Resolution Protocol (BRP) for Ad Hoc Networks , 2002 .

[3]  Mihaela Cardei,et al.  Routing Security in Ad Hoc Wireless Networks , 2010 .

[4]  Niroj Kumar Pani A Secure Zone-Based Routing Protocol for Mobile Ad Hoc Networks , 2009 .

[5]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[6]  Emin Gün Sirer,et al.  SHARP: a hybrid adaptive routing protocol for mobile ad hoc networks , 2003, MobiHoc '03.

[7]  Pardeep Singh,et al.  New Scheme of Adaptive Zone Routing Protocol , 2010 .

[8]  Leonard Barolli,et al.  A Zone Based Routing Protocol for Ad Hoc Networks and Its Performance Improvement by Reduction of Control Packets , 2010, 2010 International Conference on Broadband, Wireless Computing, Communication and Applications.

[9]  L. Nassef,et al.  Enhancing security of zone-based routing protocol using trust , 2012, 2012 8th International Conference on Informatics and Systems (INFOS).

[10]  Gabriel Montenegro,et al.  Crypto-based identifiers (CBIDs): Concepts and applications , 2004, TSEC.

[11]  N. Beijar Zone Routing Protocol ( ZRP ) , 2002 .

[12]  Yih-Chun Hu,et al.  Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.

[13]  Mukesh Singhal,et al.  Secure routing in mobile wireless ad hoc networks , 2003, Ad Hoc Networks.

[14]  Saud Rugeish Alotaibi Stability of secure routing protocol in ad hoc wireless network , 2010 .

[15]  CastellucciaClaude,et al.  Crypto-based identifiers (CBIDs) , 2004 .

[16]  S. Duraisamy,et al.  A trust system in manet with secure key authentication mechanism , 2012, 2012 International Conference on Recent Trends in Information Technology.