Robust Secure Routing Protocol for Mobile Ad Hoc Networks (MANETs)

Ravilla Dilli, P. Chandra Sekhar Reddy

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

Secure Hash Algorithm (SHA-3) is a next generation security standard used in the world of electronic communications where the digital messages are transformed into “message digest” for creating digital signatures. Any changes in the original message leads to a change in the message digest and it becomes easy to detect the modifications to the original message. Hash functions are used in message authentication. They are also used in routine software upgrades to make sure that the new software has not been tampered with. SHA-3 is a family of functions based on Keccak, some of them can be implemented with minimal additional circuitry on a chip and are very useful alternatives for providing security in small devices. SHA-3 is not a replacement for SHA-2 but it is offered as a backup. So far, there is no procedure that exists to crack the SHA-2 and still remains secure and viable. In this paper, HMAC-SHA-3 standard algorithms were used to address Data Integrity of the message being sent using AODV routing algorithm for MANETs. Message authentication, confidentiality, Integrity were addressed using secure routing. All possible attacks were addressed in AODV using SHA-3 algorithm and the tool used for simulation was Qualnet 7.4.

Original languageEnglish
Title of host publicationLecture Notes in Networks and Systems
PublisherSpringer Paris
Pages393-399
Number of pages7
DOIs
Publication statusPublished - 01-01-2019

Publication series

NameLecture Notes in Networks and Systems
Volume33
ISSN (Print)2367-3370
ISSN (Electronic)2367-3389

Fingerprint

Mobile ad hoc networks
Routing protocols
Authentication
Electronic document identification systems
Hash functions
Routing algorithms
Cracks
Communication

All Science Journal Classification (ASJC) codes

  • Control and Systems Engineering
  • Signal Processing
  • Computer Networks and Communications

Cite this

Dilli, R., & Chandra Sekhar Reddy, P. (2019). Robust Secure Routing Protocol for Mobile Ad Hoc Networks (MANETs). In Lecture Notes in Networks and Systems (pp. 393-399). (Lecture Notes in Networks and Systems; Vol. 33). Springer Paris. https://doi.org/10.1007/978-981-10-8204-7_40
Dilli, Ravilla ; Chandra Sekhar Reddy, P. / Robust Secure Routing Protocol for Mobile Ad Hoc Networks (MANETs). Lecture Notes in Networks and Systems. Springer Paris, 2019. pp. 393-399 (Lecture Notes in Networks and Systems).
@inbook{353afb53e96543bd92f9de7f12b51c01,
title = "Robust Secure Routing Protocol for Mobile Ad Hoc Networks (MANETs)",
abstract = "Secure Hash Algorithm (SHA-3) is a next generation security standard used in the world of electronic communications where the digital messages are transformed into “message digest” for creating digital signatures. Any changes in the original message leads to a change in the message digest and it becomes easy to detect the modifications to the original message. Hash functions are used in message authentication. They are also used in routine software upgrades to make sure that the new software has not been tampered with. SHA-3 is a family of functions based on Keccak, some of them can be implemented with minimal additional circuitry on a chip and are very useful alternatives for providing security in small devices. SHA-3 is not a replacement for SHA-2 but it is offered as a backup. So far, there is no procedure that exists to crack the SHA-2 and still remains secure and viable. In this paper, HMAC-SHA-3 standard algorithms were used to address Data Integrity of the message being sent using AODV routing algorithm for MANETs. Message authentication, confidentiality, Integrity were addressed using secure routing. All possible attacks were addressed in AODV using SHA-3 algorithm and the tool used for simulation was Qualnet 7.4.",
author = "Ravilla Dilli and {Chandra Sekhar Reddy}, P.",
year = "2019",
month = "1",
day = "1",
doi = "10.1007/978-981-10-8204-7_40",
language = "English",
series = "Lecture Notes in Networks and Systems",
publisher = "Springer Paris",
pages = "393--399",
booktitle = "Lecture Notes in Networks and Systems",
address = "France",

}

Dilli, R & Chandra Sekhar Reddy, P 2019, Robust Secure Routing Protocol for Mobile Ad Hoc Networks (MANETs). in Lecture Notes in Networks and Systems. Lecture Notes in Networks and Systems, vol. 33, Springer Paris, pp. 393-399. https://doi.org/10.1007/978-981-10-8204-7_40

Robust Secure Routing Protocol for Mobile Ad Hoc Networks (MANETs). / Dilli, Ravilla; Chandra Sekhar Reddy, P.

Lecture Notes in Networks and Systems. Springer Paris, 2019. p. 393-399 (Lecture Notes in Networks and Systems; Vol. 33).

Research output: Chapter in Book/Report/Conference proceedingChapter

TY - CHAP

T1 - Robust Secure Routing Protocol for Mobile Ad Hoc Networks (MANETs)

AU - Dilli, Ravilla

AU - Chandra Sekhar Reddy, P.

PY - 2019/1/1

Y1 - 2019/1/1

N2 - Secure Hash Algorithm (SHA-3) is a next generation security standard used in the world of electronic communications where the digital messages are transformed into “message digest” for creating digital signatures. Any changes in the original message leads to a change in the message digest and it becomes easy to detect the modifications to the original message. Hash functions are used in message authentication. They are also used in routine software upgrades to make sure that the new software has not been tampered with. SHA-3 is a family of functions based on Keccak, some of them can be implemented with minimal additional circuitry on a chip and are very useful alternatives for providing security in small devices. SHA-3 is not a replacement for SHA-2 but it is offered as a backup. So far, there is no procedure that exists to crack the SHA-2 and still remains secure and viable. In this paper, HMAC-SHA-3 standard algorithms were used to address Data Integrity of the message being sent using AODV routing algorithm for MANETs. Message authentication, confidentiality, Integrity were addressed using secure routing. All possible attacks were addressed in AODV using SHA-3 algorithm and the tool used for simulation was Qualnet 7.4.

AB - Secure Hash Algorithm (SHA-3) is a next generation security standard used in the world of electronic communications where the digital messages are transformed into “message digest” for creating digital signatures. Any changes in the original message leads to a change in the message digest and it becomes easy to detect the modifications to the original message. Hash functions are used in message authentication. They are also used in routine software upgrades to make sure that the new software has not been tampered with. SHA-3 is a family of functions based on Keccak, some of them can be implemented with minimal additional circuitry on a chip and are very useful alternatives for providing security in small devices. SHA-3 is not a replacement for SHA-2 but it is offered as a backup. So far, there is no procedure that exists to crack the SHA-2 and still remains secure and viable. In this paper, HMAC-SHA-3 standard algorithms were used to address Data Integrity of the message being sent using AODV routing algorithm for MANETs. Message authentication, confidentiality, Integrity were addressed using secure routing. All possible attacks were addressed in AODV using SHA-3 algorithm and the tool used for simulation was Qualnet 7.4.

UR - http://www.scopus.com/inward/record.url?scp=85063274997&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85063274997&partnerID=8YFLogxK

U2 - 10.1007/978-981-10-8204-7_40

DO - 10.1007/978-981-10-8204-7_40

M3 - Chapter

T3 - Lecture Notes in Networks and Systems

SP - 393

EP - 399

BT - Lecture Notes in Networks and Systems

PB - Springer Paris

ER -

Dilli R, Chandra Sekhar Reddy P. Robust Secure Routing Protocol for Mobile Ad Hoc Networks (MANETs). In Lecture Notes in Networks and Systems. Springer Paris. 2019. p. 393-399. (Lecture Notes in Networks and Systems). https://doi.org/10.1007/978-981-10-8204-7_40