Secure Routing Scheme in MANETs using Secret Key Sharing
نویسنده
چکیده
A Mobile Ad-hoc NETwork (MANETs) follows a dynamic topology with distributed architecture. MANETs has no basic infrastructure also has no fixed access point or routers, where in the nodes moves in an undefined manner in a specified area of work. Basically, the distributed dynamic architecture is vulnerable to various kinds of attacks like blackhole, wormhole flooding, etc. Providing a security measure that would enhance the role of security services during a data transmission is a critical task. In this paper, we propose a new solution for the secure routing of all tree based multicast routing protocols such as MAODV, ADMR, etc, against attacks like flooding, wormhole, blackhole attack etc,. In this scheme, keys are generated by source and transmitted to the client nodes in the network. Interpolation concept under the finite field provides a promising outcome for securing the network. The proposed scheme is based on Shamir secret sharing scheme with encrypted transmission of keys. As the transmission of keys to the participant nodes is done using RSA public key encryption algorithm, it is not vulnerable to attacks like replay attacks, and other spoofing
منابع مشابه
Computationally secure multiple secret sharing: models, schemes, and formal security analysis
A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...
متن کاملDesign of certification authority using secret redistribution and multicast routing in wireless mesh networks
Wireless mesh networks (WMNs) should provide authentication and key management without a trusted third party because of their self-organizing and self-configuring characteristics. Several solutions to this problem have been proposed in mobile ad hoc networks (MANETs). But they are not optimal for WMNs because WMNs are with stationary mesh routers (MRs) that do not suffer from the limited power ...
متن کاملAn Efficient Threshold Verifiable Multi-Secret Sharing Scheme Using Generalized Jacobian of Elliptic Curves
In a (t,n)-threshold secret sharing scheme, a secret s is distributed among n participants such that any group of t or more participants can reconstruct the secret together, but no group of fewer than t participants can do. In this paper, we propose a verifiable (t,n)-threshold multi-secret sharing scheme based on Shao and Cao, and the intractability of the elliptic curve discrete logar...
متن کاملDesign and formal verification of DZMBE+
In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature...
متن کاملA Novel Secure Routing Protocol in MANET
This chapter gives an overview of research works on secure routing protocol and also describes a Novel Secure Routing Protocol RSRP proposed by the authors. The routes, which are free from any malicious node and which belong to the set of disjoint routes between a source destination pair, are considered as probable routes. Shamir’s secret sharing principle is applied on those probable routes to...
متن کامل