TY - CHAP
T1 - Robust Secure Routing Protocol for Mobile Ad Hoc Networks (MANETs)
AU - Dilli, Ravilla
AU - Chandra Sekhar Reddy, P.
PY - 2019/1/1
Y1 - 2019/1/1
N2 - Secure Hash Algorithm (SHA-3) is a next generation security standard used in the world of electronic communications where the digital messages are transformed into “message digest” for creating digital signatures. Any changes in the original message leads to a change in the message digest and it becomes easy to detect the modifications to the original message. Hash functions are used in message authentication. They are also used in routine software upgrades to make sure that the new software has not been tampered with. SHA-3 is a family of functions based on Keccak, some of them can be implemented with minimal additional circuitry on a chip and are very useful alternatives for providing security in small devices. SHA-3 is not a replacement for SHA-2 but it is offered as a backup. So far, there is no procedure that exists to crack the SHA-2 and still remains secure and viable. In this paper, HMAC-SHA-3 standard algorithms were used to address Data Integrity of the message being sent using AODV routing algorithm for MANETs. Message authentication, confidentiality, Integrity were addressed using secure routing. All possible attacks were addressed in AODV using SHA-3 algorithm and the tool used for simulation was Qualnet 7.4.
AB - Secure Hash Algorithm (SHA-3) is a next generation security standard used in the world of electronic communications where the digital messages are transformed into “message digest” for creating digital signatures. Any changes in the original message leads to a change in the message digest and it becomes easy to detect the modifications to the original message. Hash functions are used in message authentication. They are also used in routine software upgrades to make sure that the new software has not been tampered with. SHA-3 is a family of functions based on Keccak, some of them can be implemented with minimal additional circuitry on a chip and are very useful alternatives for providing security in small devices. SHA-3 is not a replacement for SHA-2 but it is offered as a backup. So far, there is no procedure that exists to crack the SHA-2 and still remains secure and viable. In this paper, HMAC-SHA-3 standard algorithms were used to address Data Integrity of the message being sent using AODV routing algorithm for MANETs. Message authentication, confidentiality, Integrity were addressed using secure routing. All possible attacks were addressed in AODV using SHA-3 algorithm and the tool used for simulation was Qualnet 7.4.
UR - http://www.scopus.com/inward/record.url?scp=85063274997&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85063274997&partnerID=8YFLogxK
U2 - 10.1007/978-981-10-8204-7_40
DO - 10.1007/978-981-10-8204-7_40
M3 - Chapter
AN - SCOPUS:85063274997
T3 - Lecture Notes in Networks and Systems
SP - 393
EP - 399
BT - Lecture Notes in Networks and Systems
PB - Springer Paris
ER -