Authenticated On-Demand Ad Hoc Routing Protocol without Pre-shared Key Distribution

Ad hoc routing is a very fundamental operation on an ad hoc network, and hence it has been a main target for an attacker to disrupt an ad hoc network. Therefore, not only secure communication among nodes but also exchanging some special messages for the purpose of security operations, such as key exchange in ad hoc networks, cannot help relying on the secure routing protocol. In this paper, we propose an authenticated on-demand ad hoc routing protocol integrated with a key establishment protocol without pre-shared secret key distribution among ad hoc nodes. The main advantage of the proposed protocol is that establishing a route and a session key between a source and a destination node, when it is needed, can be performed simultaneously in authenticated manner through the routing discovery protocol with no beforehand shared secret key. To achieve our goal, we apply the notion of ID-based statically keyed authenticator to Dynamic Source Routing protocol, so the proposed protocol does not require a public key certificate as well as pre-shared secret key distribution.

[1]  Hugo Krawczyk,et al.  A modular approach to the design and analysis of authentication and key exchange protocols (extended abstract) , 1998, STOC '98.

[2]  Mihai Nadin,et al.  Not Everything We Know We Learned , 2003, ABiALS.

[3]  Ran Canetti,et al.  Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[4]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[5]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[6]  Elizabeth M. Belding-Royer,et al.  Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.

[7]  H. J. Kadim Analytical Modelling of Power Attenuation under Parameter Fluctuations with Applications to Self-Test and Repair , 2006, First NASA/ESA Conference on Adaptive Hardware and Systems (AHS'06).

[8]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[9]  H. J. Kadim,et al.  Estimation of parameter fluctuations for robust operation in analogue circuits and systems , 2000, 2000 IEEE International Symposium on Circuits and Systems. Emerging Technologies for the 21st Century. Proceedings (IEEE Cat No.00CH36353).

[10]  David B. Johnson,et al.  The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .

[11]  H.J. Kadim Estimation of a maximum bound of uncertain parameter fluctuations with applications to analogue IP-cores , 2004, 2004 International Symposium on System-on-Chip, 2004. Proceedings..

[12]  Kenneth G. Paterson,et al.  Key Agreement Using Statically Keyed Authenticators , 2004, ACNS.

[13]  H. J. Kadim Analytical Modelling for Adaptive Multi-Purpose On-Chip Optical Interconnect , 2007, Second NASA/ESA Conference on Adaptive Hardware and Systems (AHS 2007).

[14]  Wonjun Lee,et al.  LSRP: A Lightweight Secure Routing Protocol with Low Cost for Ad-Hoc Networks , 2005, ICOIN.

[15]  N. Asokan,et al.  Securing ad hoc routing protocols , 2002, WiSE '02.

[16]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[17]  W. Walter,et al.  Contingent Negative Variation : An Electric Sign of Sensori-Motor Association and Expectancy in the Human Brain , 1964, Nature.