Enhancing the Security of MANETs using Hash Algorithms

Dilli Ravilla, Chandra Shekar Reddy Putta

Research output: Contribution to journalArticle

10 Citations (Scopus)

Abstract

Hash functions are used in information security applications for the generation and verification of digital signatures, key derivation, and pseudorandom bit generation. Hash algorithms are secure because, for a given algorithm, it is computationally infeasible to find a message that corresponds to a given message digest, or to find two different messages that produce the same message digest. Any change to a message will result in a different message digest with a very high probability. This will result in a verification failure when the secure hash algorithm is used with a digital signature algorithm or a keyed-hash message authentication algorithm. In our work, first we implemented the Zone Routing Protocol (ZRP), a hybrid MANET protocol is being implemented in Network Simulator 2 (NS2) and hashing algorithm, keyed-Hash Message Authentication Code - Secure Hashing Algorithm 512 (HMAC-SHA512) is implemented for the Authentication and Data Integrity of the information being sent. In addition to that a Trust-Based system is formulated for preventing the Denial-of-Services (DoS) Attacks. The first part of this paper introduces the HMAC-SHA512 for ensuring that the data packets are received by the destination only and in its original form but at the expense of the increased processing time at the source and the destination. The second part uses the Trust-Based system with those nodes that act maliciously being broadcasted in the network and isolated to render a higher throughput and packet delivery fraction but at the expense of the increased end to end delay.

Original languageEnglish
Pages (from-to)196-206
Number of pages11
JournalProcedia Computer Science
Volume54
DOIs
Publication statusPublished - 2015

Fingerprint

Authentication
Electronic document identification systems
Hash functions
Security of data
Routing protocols
Simulators
Throughput
Network protocols
Processing

All Science Journal Classification (ASJC) codes

  • Computer Science(all)

Cite this

Ravilla, Dilli ; Putta, Chandra Shekar Reddy. / Enhancing the Security of MANETs using Hash Algorithms. In: Procedia Computer Science. 2015 ; Vol. 54. pp. 196-206.
@article{1869bc23c9114b79b510cca463ffcf28,
title = "Enhancing the Security of MANETs using Hash Algorithms",
abstract = "Hash functions are used in information security applications for the generation and verification of digital signatures, key derivation, and pseudorandom bit generation. Hash algorithms are secure because, for a given algorithm, it is computationally infeasible to find a message that corresponds to a given message digest, or to find two different messages that produce the same message digest. Any change to a message will result in a different message digest with a very high probability. This will result in a verification failure when the secure hash algorithm is used with a digital signature algorithm or a keyed-hash message authentication algorithm. In our work, first we implemented the Zone Routing Protocol (ZRP), a hybrid MANET protocol is being implemented in Network Simulator 2 (NS2) and hashing algorithm, keyed-Hash Message Authentication Code - Secure Hashing Algorithm 512 (HMAC-SHA512) is implemented for the Authentication and Data Integrity of the information being sent. In addition to that a Trust-Based system is formulated for preventing the Denial-of-Services (DoS) Attacks. The first part of this paper introduces the HMAC-SHA512 for ensuring that the data packets are received by the destination only and in its original form but at the expense of the increased processing time at the source and the destination. The second part uses the Trust-Based system with those nodes that act maliciously being broadcasted in the network and isolated to render a higher throughput and packet delivery fraction but at the expense of the increased end to end delay.",
author = "Dilli Ravilla and Putta, {Chandra Shekar Reddy}",
year = "2015",
doi = "10.1016/j.procs.2015.06.022",
language = "English",
volume = "54",
pages = "196--206",
journal = "Procedia Computer Science",
issn = "1877-0509",
publisher = "Elsevier BV",

}

Enhancing the Security of MANETs using Hash Algorithms. / Ravilla, Dilli; Putta, Chandra Shekar Reddy.

In: Procedia Computer Science, Vol. 54, 2015, p. 196-206.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Enhancing the Security of MANETs using Hash Algorithms

AU - Ravilla, Dilli

AU - Putta, Chandra Shekar Reddy

PY - 2015

Y1 - 2015

N2 - Hash functions are used in information security applications for the generation and verification of digital signatures, key derivation, and pseudorandom bit generation. Hash algorithms are secure because, for a given algorithm, it is computationally infeasible to find a message that corresponds to a given message digest, or to find two different messages that produce the same message digest. Any change to a message will result in a different message digest with a very high probability. This will result in a verification failure when the secure hash algorithm is used with a digital signature algorithm or a keyed-hash message authentication algorithm. In our work, first we implemented the Zone Routing Protocol (ZRP), a hybrid MANET protocol is being implemented in Network Simulator 2 (NS2) and hashing algorithm, keyed-Hash Message Authentication Code - Secure Hashing Algorithm 512 (HMAC-SHA512) is implemented for the Authentication and Data Integrity of the information being sent. In addition to that a Trust-Based system is formulated for preventing the Denial-of-Services (DoS) Attacks. The first part of this paper introduces the HMAC-SHA512 for ensuring that the data packets are received by the destination only and in its original form but at the expense of the increased processing time at the source and the destination. The second part uses the Trust-Based system with those nodes that act maliciously being broadcasted in the network and isolated to render a higher throughput and packet delivery fraction but at the expense of the increased end to end delay.

AB - Hash functions are used in information security applications for the generation and verification of digital signatures, key derivation, and pseudorandom bit generation. Hash algorithms are secure because, for a given algorithm, it is computationally infeasible to find a message that corresponds to a given message digest, or to find two different messages that produce the same message digest. Any change to a message will result in a different message digest with a very high probability. This will result in a verification failure when the secure hash algorithm is used with a digital signature algorithm or a keyed-hash message authentication algorithm. In our work, first we implemented the Zone Routing Protocol (ZRP), a hybrid MANET protocol is being implemented in Network Simulator 2 (NS2) and hashing algorithm, keyed-Hash Message Authentication Code - Secure Hashing Algorithm 512 (HMAC-SHA512) is implemented for the Authentication and Data Integrity of the information being sent. In addition to that a Trust-Based system is formulated for preventing the Denial-of-Services (DoS) Attacks. The first part of this paper introduces the HMAC-SHA512 for ensuring that the data packets are received by the destination only and in its original form but at the expense of the increased processing time at the source and the destination. The second part uses the Trust-Based system with those nodes that act maliciously being broadcasted in the network and isolated to render a higher throughput and packet delivery fraction but at the expense of the increased end to end delay.

UR - http://www.scopus.com/inward/record.url?scp=84944046810&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84944046810&partnerID=8YFLogxK

U2 - 10.1016/j.procs.2015.06.022

DO - 10.1016/j.procs.2015.06.022

M3 - Article

VL - 54

SP - 196

EP - 206

JO - Procedia Computer Science

JF - Procedia Computer Science

SN - 1877-0509

ER -