Proposal for SZRP protocol with the establishment of the salted SHA-256 Bit HMAC PBKDF2 advance security system in a MANET

The cooperative junction of mobile nodes consists of any centralized access point or a self-configuring network existing infrastructure without the required intervention is called ad hoc network. A well designed security protocol is a challenging task due to its unique characteristics such as, lack of central authority, frequent topology changes, rapid node mobility, shared radio channel and limited availability of resources for ad hoc network. However, most of these protocols are two kinds. They are proactive and reactive in terms. Both of these approaches contains their own limitations, for example, in maintaining the routing information the proactive protocols use excess bandwidth while, the reactive ones have long route request delay. In this paper, we proposed a secure hybrid ad hoc routing protocol, called Secure Zone Routing Protocol (SZRP). The proposed protocol is based on the concept of zone routing protocol (ZRP) with AES (Advanced Encryption System).

[1]  Shoichi Hirose,et al.  A Lightweight 256-Bit Hash Function for Hardware and Low-End Devices: Lesamnta-LW , 2010, ICISC.

[2]  CONTENTS 2 Contents , 2002 .

[3]  Helena Handschuh,et al.  Security Analysis of SHA-256 and Sisters , 2003, Selected Areas in Cryptography.

[4]  Azzedine Boukerche,et al.  Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks , 2008 .

[5]  John Viega,et al.  Secure programming cookbook for C and C , 2003 .

[6]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[7]  Matthew D Falk Cryptographic Cloud Storage Framework , 2013 .

[8]  Elizabeth M. Belding-Royer,et al.  A review of current routing protocols for ad hoc mobile wireless networks , 1999, IEEE Wirel. Commun..

[9]  Behrouz A. Forouzan,et al.  Cryptography and network security , 1998 .

[10]  Simon Josefsson PKCS #5: Password-Based Key Derivation Function 2 (PBKDF2) Test Vectors , 2011, RFC.

[11]  William E. Burr,et al.  Selecting the Advanced Encryption Standard , 2003, IEEE Secur. Priv..

[12]  Kevin Curran,et al.  A hash-based image encryption algorithm , 2010 .

[13]  Al-Sakib Khan Pathan Security of Self-Organizing Networks: MANET, WSN, WMN, VANET , 2010 .

[14]  Ramin Hekmat,et al.  Ad-hoc networks - fundamental properties and network topologies , 2006 .

[15]  Michel Barbeau,et al.  Principles of ad hoc networking , 2007 .

[16]  N. Beijar Zone Routing Protocol ( ZRP ) , 2002 .

[17]  Silvio Micali,et al.  A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..

[18]  Subir Kumar Sarkar,et al.  Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications , 2007 .

[19]  Radia J. Perlman,et al.  Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.

[20]  Paul E. Hoffman,et al.  Determining Strengths For Public Keys Used For Exchanging Symmetric Keys , 2004, RFC.

[21]  J. V. R. Murthy,et al.  Secure zone based routing protocol for mobile adhoc networks , 2013, 2013 International Mutli-Conference on Automation, Computing, Communication, Control and Compressed Sensing (iMac4s).