CFP last date
20 December 2024
Reseach Article

OTNA: One Time Node Authentication for Secure MANET

by Komal Naik (joshi), Arati M. Dixit
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 104 - Number 14
Year of Publication: 2014
Authors: Komal Naik (joshi), Arati M. Dixit
10.5120/18274-9381

Komal Naik (joshi), Arati M. Dixit . OTNA: One Time Node Authentication for Secure MANET. International Journal of Computer Applications. 104, 14 ( October 2014), 43-48. DOI=10.5120/18274-9381

@article{ 10.5120/18274-9381,
author = { Komal Naik (joshi), Arati M. Dixit },
title = { OTNA: One Time Node Authentication for Secure MANET },
journal = { International Journal of Computer Applications },
issue_date = { October 2014 },
volume = { 104 },
number = { 14 },
month = { October },
year = { 2014 },
issn = { 0975-8887 },
pages = { 43-48 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume104/number14/18274-9381/ },
doi = { 10.5120/18274-9381 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:36:11.958739+05:30
%A Komal Naik (joshi)
%A Arati M. Dixit
%T OTNA: One Time Node Authentication for Secure MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 104
%N 14
%P 43-48
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Due to infrastructure – less networks and multi - hop communication features of Mobile ad hoc network (MANET), every node in MANET has to cooperate with each other. Therefore, node security becomes one of the important research areas of MANET. The resources that provided to MANET nodes such as battery power, memory, and bandwidth are limited. As a result, developing a resource – aware node authentication protocol becomes challenge for researchers. The proposed protocol provides One Time Node Authentication (OTNA) for every node joining MANET. To achieve this, the OTNA protocol provides one additional field 'status' in the routing table of the legitimate nodes, and the Malicious Node Table (MNT). The 'status' field shows authentication status of the nodes present in MANET. The MNT is used to keep record of the malicious nodes detected during node authentication. To perform node authentication, OTNA uses the basics of Challenge - Response Protocol (CRP) and one-way hash function with three message exchanges. In the OTNA protocol, only two nodes are involved in authentication process, which allows other available nodes for packet forwarding process. To the best of our knowledge, OTNA protocol facilitates optimal secure packet delivery. The correctness of the OTNA protocol is proved with the help of GNY logic.

References
  1. P. Singh, M. Chandra Pandey, "Evaluation of certificate-based authentication in Mobile Ad-hoc networks", International Conference on Recent Trends in Engineering and Technology, 2012.
  2. J. Sen, "Robust and Efficient Node Authentication Protocol for Mobile Ad Hoc Networks", Second International Conference on Computational Intelligence, Modelling and Simulation (CIMSiM), 2010, pp. 476-481.
  3. MM Swift, B Shah, 2002. Challenge-response authentication and key exchange for a connectionless security protocol. US Patent. Google Patents, 2002.
  4. D. Djenouri, N. Badache, "Survey on security issues in Mobile Ad-hoc Networks", IEEE communications surveys, 2005.
  5. N. Komninos, D. Vergados, C. Douligeris, "A Two-Step Authentication Framework in Mobile Ad-Hoc Networks", China Communication Journal, 2007.
  6. H deng, A. Mukharjee, D. Agrawal, "Threshold and identity-based key management and authentication for wireless network", International conference on Information technology: coding and computing (ITCC'04), Vol. 1, 2004.
  7. L. Zhou, Z. Haas. 1999. Securing ad hoc networks, IEEE Network Journal, Vol 13, no. 6, 1999, pp 24-30.
  8. J. Kong, P. Zefros, H. Luo, S. Lu, L. Zhang, "Robust and ubiquitous security support for mobile ad hoc networks" in Proceedings of the 9th International Conference on Network Protocols, 2001, pp 251-260.
  9. G. Montenegro, C. Castellucia, "Statistically unique and cryptographically verifiable (SUCV) identifiers and addresses", in Proceedings of the Network and Distributed System Security Symposium, 2002.
  10. L. Eshenauer, V. D. Gligor, J. Baras, "On trust establishment in mobile ad hoc networks", in Proceedings of the Security Protocols Workshop, LNCS vol no 2845,Springer- Verlag, 2002.
  11. A. Abdul-Rahman, S. Hailes, "A distributed trust model", in Proceedings of the New Security Paradigms Workshop, Langdale, Cumbria, United Kingdom, 1997, pp. 48 - 60 .
  12. J. S. Baras, T. Jiang, "Managing trust in self-organized mobile ad hoc networks", in Proceedings of the 12th Annual network and Distributed System Security Symposium(NDSS 2005), Wireless and Mobile Security Workshop, February 2005, San Diego, California, USA.
  13. J. Sen, P. R. Chowdhury, I. Sengupta, "A distributed trust establishment scheme for mobile ad hoc networks", in Proceedings of the International Conference on Computing: Theory and Applications, 2007, pp. 51-58 .
  14. J. Sen, A. Ukil, D. Bera, A. Pal, "A distributed intrusion detection system for mobile ad hoc networks",in Proceedings of the 16th IEEE International Conference on Networking(ICON 2008), New Delhi, December 2008, pp. 1-6.
  15. M. K. Rafsanjani, A. Movaghar, "Identifying Monitoring Nodes with Selection of Authorized Nodes in Mobile Ad Hoc Networks",World Applied Sciences Journal, vol. 4, no. 3, 2008, pp. 444 – 449.
  16. M. Burrows, M. Abadi, R. M. Needham, "A Logic of Authentication". ACM Transactions on Computer Systems, Vol. 8, No. 1, Feb 1990, pp. 18-36.
  17. L. Gong, R. Needham, R. Yahalom, "Reasoning About Belief in Cryptographic Protocols". In proceedings of the 1990 IEEE Symposium on Research in Security and Privacy, Oakland, 7-9 May 1990.
  18. W. Teepe, "Proving Possession Of Arbitrary Secrets While Not Giving Them Away:New Protocols And A Proof In Gny Logic", Synthese, 149(2), March 2006, pp. 409–443.
  19. A. D. Rubin, P. Honeyman, "Formal Methods for the Analysis of Authentication Protocols", CITI Technical Report. Technical Report CITI TR, October 1993.
  20. K. Naik (Joshi), A. Dixit, "Resource Aware Node Authentication Framework for Secure MANET", IOSR Journal of Computer Engineering (IOSR-JCE), Volume 16,May-Jun. 2014,pp. 109-113.
Index Terms

Computer Science
Information Sciences

Keywords

MANET Node Authentication Challenge-Response protocol GNY Logic.