ePrints@IIScePrints@IISc Home | About | Browse | Latest Additions | Advanced Search | Contact | Help

A Protocol for End-to-End Key Establishment during Route Discovery in MANETs

Talawar, Shrikant H and Hansdah, RC (2015) A Protocol for End-to-End Key Establishment during Route Discovery in MANETs. In: IEEE 29th International Conference on Advanced Information Networking and Applications (IEEE AINA), MAR 25-27, 2015, Gwangju, SOUTH KOREA, pp. 176-184.

[img] PDF
IEEE_AINA_176_2015.pdf - Published Version
Restricted to Registered users only

Download (244kB) | Request a copy
Official URL: http://dx.doi.org/10.1109/AINA.2015.183


An end-to-end shared secret key between two distant nodes in a mobile ad hoc network(MANET) is essential for providing secure communication between them. However, to provide effective security in a MANET, end-to-end key establishment should be secure against both internal as well as external malicious nodes. An external malicious node in a MANET does not possess any valid security credential related to the MANET, whereas an internal malicious node would possess some valid security credentials related to the MANET. Most of the protocols for end-to-end key establishment in MANETs either make an unrealistic assumption that an end-to-end secure channel exists between source and destination or use bandwidth consuming multi-path schemes. In this paper, we propose a simple and efficient protocol for end-to-end key establishment during route discovery (E2-KDR) in MANETs. Unlike many other existing schemes, the protocol establishes end-to-end key using trust among the nodes which, during initial stage, is established using public key certificate issued by an off-line membership granting authority. However, the use of public key in the proposed protocol is minimal to make it efficient. Since the key is established during route discovery phase, it reduces the key establishment time. The proposed protocol exploits mobility to establish end-to-end key, and provides comprehensive solution by making use of symmetric keys for protecting routing control messages and end-to-end communication. Moreover, as the end-to-end keys are established during route discovery phase, the protocol is on-demand and only necessary keys are established, which makes the protocol storage scalable. The protocol is shown to be secure using security analysis, and its efficiency is confirmed by the results obtained from simulation experiments.

Item Type: Conference Proceedings
Series.: International Conference on Advanced Information Networking and Applications
Additional Information: Copy right for this article belongs to the IEEE, 345 E 47TH ST, NEW YORK, NY 10017 USA
Department/Centre: Division of Electrical Sciences > Computer Science & Automation
Date Deposited: 08 Oct 2016 06:45
Last Modified: 08 Oct 2016 06:45
URI: http://eprints.iisc.ac.in/id/eprint/54753

Actions (login required)

View Item View Item