Robust Secure Routing Protocol for Mobile Ad Hoc Networks (MANETs)

Ravilla Dilli, P. Chandra Sekhar Reddy

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Citation (Scopus)

Abstract

Secure Hash Algorithm (SHA-3) is a next generation security standard used in the world of electronic communications where the digital messages are transformed into “message digest” for creating digital signatures. Any changes in the original message leads to a change in the message digest and it becomes easy to detect the modifications to the original message. Hash functions are used in message authentication. They are also used in routine software upgrades to make sure that the new software has not been tampered with. SHA-3 is a family of functions based on Keccak, some of them can be implemented with minimal additional circuitry on a chip and are very useful alternatives for providing security in small devices. SHA-3 is not a replacement for SHA-2 but it is offered as a backup. So far, there is no procedure that exists to crack the SHA-2 and still remains secure and viable. In this paper, HMAC-SHA-3 standard algorithms were used to address Data Integrity of the message being sent using AODV routing algorithm for MANETs. Message authentication, confidentiality, Integrity were addressed using secure routing. All possible attacks were addressed in AODV using SHA-3 algorithm and the tool used for simulation was Qualnet 7.4.

Original languageEnglish
Title of host publicationLecture Notes in Networks and Systems
PublisherSpringer Paris
Pages393-399
Number of pages7
DOIs
Publication statusPublished - 01-01-2019

Publication series

NameLecture Notes in Networks and Systems
Volume33
ISSN (Print)2367-3370
ISSN (Electronic)2367-3389

All Science Journal Classification (ASJC) codes

  • Control and Systems Engineering
  • Signal Processing
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Robust Secure Routing Protocol for Mobile Ad Hoc Networks (MANETs)'. Together they form a unique fingerprint.

Cite this