A light weight security scheme for HWMP protocol using Elliptic Curve technique

In this paper we have implemented the ECDSA (Elliptic Curve Digital Signature Algorithm) technique to provide security in HWMP (Hybrid Wireless Mesh Protocol). The motivation behind the use of ECDSA is that it is integrated into the IEEE P802.11s/D4.0 standard. We have used the ECDSA technique to secure control message in HWMP, namely PREQ (Path Request) and PREP (Path Reply). In these Control messages, we are interested only by mutable fields (i.e. fields that change during control packet exchange). Simulation results show that the ECDSA-HWMP does not too much a long overhead compared to the orignal HWMP.

[1]  Donal O'Mahony,et al.  Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.

[2]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[3]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[4]  Panagiotis Papadimitratos,et al.  Secure link state routing for mobile ad hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[5]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[6]  Emmanuel Bresson,et al.  A security solution for IEEE 802.11's ad hoc mode: password-authentication and group DiffieHellman key exchange , 2007, Int. J. Wirel. Mob. Comput..

[7]  Futai Zou,et al.  A Survey on Security in Wireless Mesh Networks , 2010 .

[8]  Charles E. Perkins,et al.  Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.

[9]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[10]  Choong Seon Hong,et al.  SHWMP: A Secure Hybrid Wireless Mesh Protocol for IEEE 802.11s Wireless Mesh Networks , 2009, Trans. Comput. Sci..

[11]  D. Harkins,et al.  Simultaneous Authentication of Equals: A Secure, Password-Based Key Exchange for Mesh Networks , 2008, 2008 Second International Conference on Sensor Technologies and Applications (sensorcomm 2008).

[12]  Jalel Ben-Othman,et al.  On Securing HWMP Using IBC , 2011, 2011 IEEE International Conference on Communications (ICC).

[13]  Guangsong Li An Identity-Based Security Architecture for Wireless Mesh Networks , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).

[14]  Vivek Kapoor,et al.  Elliptic curve cryptography , 2008, UBIQ.

[15]  Alfred Menezes,et al.  Elliptic Curves and Cryptography , 1999 .

[16]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[17]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[18]  Quynh H. Dang,et al.  Secure Hash Standard | NIST , 2015 .

[19]  Yih-Chun Hu,et al.  Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.

[20]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[21]  Charles E. Perkins,et al.  Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for mobile computers , 1994, SIGCOMM.

[22]  Celia Li,et al.  Secure Routing for Wireless Mesh Networks , 2011, Int. J. Netw. Secur..

[23]  尚弘 島影 National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .

[24]  Phung Huu Phu,et al.  Securing AODV Routing Protocol in Mobile Ad-Hoc Networks , 2009, IWAN.

[25]  N. Asokan,et al.  Securing ad hoc routing protocols , 2002, WiSE '02.

[26]  Dan Harkins,et al.  The Internet Key Exchange (IKE) , 1998, RFC.