Session Key Agreement Protocol for End-to-End Security in MANET

  • Jeong-Mi Lim
  • Chang-Seop Park
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3983)


Mobile ad hoc network (MANET) is an infrastructure-less network, consisting of wireless nodes without access points or base stations. Since mobile nodes in MANET move very easily and freely, MANET is appropriate for ubiquitous environment. But, from a security viewpoint, MANET is a very weak network since various security attacks against it such as eavesdropping or DoS (Denial-of-Service) attack can be more easily performed than against the wired network. In this paper, we design a key agreement protocol for end-to-end security between source node and destination node without any security infrastructure. Diffie-Hellman key agreement mechanism is combined with a concept of CGA (Cryptographically Generated Address) mechanism to provide source authentication service. Based on the IPv6’s IP auto-configuration, how to generate IPv6 address from the Diffie-Hellman key pair is explained, and a mechanism to generate session key for both authenticating nodes and protecting messages exchanged between them is suggested. We also evaluate the performance of our mechanism using NS2 (Network Simulator).


Source Node Destination Node Message Authentication Code Pause Time IPv6 Address 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Aura, T.: Cryptographically Generated Address (CGA), RFC 3972, Work in Process (March 2005)Google Scholar
  2. 2.
    CMU Monarch Group.: CMU Monarch Extensions to the NS Simulator (August 2002),
  3. 3.
    Perkins, C.E., Malinen, J.T., Wakikawa, R., Belding Royer, E.M., Sun, Y.: IP Address Autoconfiguration for Ad Hoc Networks. IETF MANET Working Group (2001) draft-ietf-manet-autoconf-01.txtGoogle Scholar
  4. 4.
    Thomson, S., Narten, T.: IPv6 Stateless Address Autoconfiguration, Network Working Group RFC 2462 (December 1998)Google Scholar
  5. 5.
    Viega, J., Messier, M., Chandra, P.: Network Security with OpenSSL. O’REILLY, SebastopolGoogle Scholar
  6. 6.
    Tseng, Y.-C., Jiang, J.-R., Lee, J.-H.: Secure Bootstrapping and Routing in an IPv6-Based Ad Hoc Network. In: ICPP Workshops (2003)Google Scholar
  7. 7.
    Zhou, L., Haas, Z.: Securing Ad Hoc Networks. IEEE Network 13(6), 24–30 (1999)CrossRefGoogle Scholar
  8. 8.
    Luo, H., Zerfos, P., Kong, J., Lu, S., Zhang, L.: Self-Securing Ad Hoc Wireless Networks. In: Seventh IEEE Symposium on Computers and Communications, ISCC 2002 (2002)Google Scholar
  9. 9.
    Montenegro, G., Castelluccia, C.: Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Address. In: Proc. Ninth Ann. Network and Distributed System Security Symp., NDSS (2002)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Jeong-Mi Lim
    • 1
  • Chang-Seop Park
    • 1
  1. 1.Department of Computer ScienceDankook UniversityChungnamKorea

Personalised recommendations