Session Key Agreement Protocol for End-to-End Security in MANET
Mobile ad hoc network (MANET) is an infrastructure-less network, consisting of wireless nodes without access points or base stations. Since mobile nodes in MANET move very easily and freely, MANET is appropriate for ubiquitous environment. But, from a security viewpoint, MANET is a very weak network since various security attacks against it such as eavesdropping or DoS (Denial-of-Service) attack can be more easily performed than against the wired network. In this paper, we design a key agreement protocol for end-to-end security between source node and destination node without any security infrastructure. Diffie-Hellman key agreement mechanism is combined with a concept of CGA (Cryptographically Generated Address) mechanism to provide source authentication service. Based on the IPv6’s IP auto-configuration, how to generate IPv6 address from the Diffie-Hellman key pair is explained, and a mechanism to generate session key for both authenticating nodes and protecting messages exchanged between them is suggested. We also evaluate the performance of our mechanism using NS2 (Network Simulator).
KeywordsSource Node Destination Node Message Authentication Code Pause Time IPv6 Address
Unable to display preview. Download preview PDF.
- 1.Aura, T.: Cryptographically Generated Address (CGA), RFC 3972, Work in Process (March 2005)Google Scholar
- 2.CMU Monarch Group.: CMU Monarch Extensions to the NS Simulator (August 2002), http://mnarch.cs.cmu.edu/cmu-ns.html
- 3.Perkins, C.E., Malinen, J.T., Wakikawa, R., Belding Royer, E.M., Sun, Y.: IP Address Autoconfiguration for Ad Hoc Networks. IETF MANET Working Group (2001) draft-ietf-manet-autoconf-01.txtGoogle Scholar
- 4.Thomson, S., Narten, T.: IPv6 Stateless Address Autoconfiguration, Network Working Group RFC 2462 (December 1998)Google Scholar
- 5.Viega, J., Messier, M., Chandra, P.: Network Security with OpenSSL. O’REILLY, SebastopolGoogle Scholar
- 6.Tseng, Y.-C., Jiang, J.-R., Lee, J.-H.: Secure Bootstrapping and Routing in an IPv6-Based Ad Hoc Network. In: ICPP Workshops (2003)Google Scholar
- 8.Luo, H., Zerfos, P., Kong, J., Lu, S., Zhang, L.: Self-Securing Ad Hoc Wireless Networks. In: Seventh IEEE Symposium on Computers and Communications, ISCC 2002 (2002)Google Scholar
- 9.Montenegro, G., Castelluccia, C.: Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Address. In: Proc. Ninth Ann. Network and Distributed System Security Symp., NDSS (2002)Google Scholar