Analysis of mechanisms of ensure the integrity and authenticity of the messages in MANET
DOI:
https://doi.org/10.18372/2410-7840.14.3495Keywords:
MANET, ad hoc, security mechanisms in MANET, protection against attacks on MANET, secure routing protocolAbstract
Ensuring the integrity and authenticity of the messages in today's MANET networks is an urgent scientific and technical problem. The way to solve it is to conduct a continuous review of security threats of MANET, as well as the development and improvement of mechanisms of ensure the integrity and authenticity of information in the network. The analysis of the current attacks on the MANET networks and the corresponding threats of the integrity and authenticity of information has been done. The advantages and disadvantages of secure routing protocols are shown. As a result, identified promising areas of improvement and further development of security systems and secure routing protocols in MANET networks.References
Миночкин А.И. Многопутевая маршрутизация в мобильных радиосетях / Миночкин А.И., Романюк В.А.
// Зв’язок. – 2004. – № 6. – C. 65 – 69.
Миночкин А.И. Маршрутизация в мобильных радиосетях – проблема и пути решения / Миночкин А.И., Романюк В.А. // Зв’язок. – 2006. – № 7. – С. 49 – 55.
Yi S. MOCA: Mobile Certificate Authority for Wireless Ad Hoc Networks / S. Yi, and R. Kravets // Proceedings
of the 2nd Annual PKI Research Workshop (PKI’03), PP. 65 – 79, 2003.
Zhang Y. Securing Mobile Ad Hoc Networks with Certificateless Public Keys / Y. Zhang, W. Liu, W. Lou, Y. Fang // IEEE Transactions on Dependable and Secure Computing, vol.3, no. 4, PP. 386 – 399, OCTOBERDECEMBER 2006.
Anjum F. Security for Wireless Ad Hoc Networks / F. Anjum, P. Mouchtaris // John Wiley & Sons, Inc., Hoboken, New Jersey, 2007.
НД ТЗІ 2.5-004-99. Критерії оцінки захищеності інформації в комп’ютерних системах від несанкціонованого доступу. Департамент спеціальних телекомунікаційних систем та захисту інформації
Служби безпеки України, від “28” квітня 1999 р. – № 22. – Київ, 1999.
Xu Li. On Secure Mobile Ad hoc Routing / Xu Li, Amiya Nayak, Isabelle Ryl, David Simplot // Old City
Publishing, Inc. Ottawa, Canada. 2007.
Karlsson J. Routing Security in Ad-hoc Networks / J. Karlsson, L.S. Dooley, G. Pulkkis // Issues in Informing
Science and Information Technology. Vol. 9. – 2012. PP.369 – 383.
Goldberg I. Anonymity and one-way authentication in key exchange protocols / Ian Goldberg, Douglas Stebila,
Berkant Ustaoglu.
Hoeper K. Identity-Based Key Exchange Protocols for Ad Hoc Networks / K. Hoeper, G. Gong // Proceedings of the Canadian Workshop on Information Theory (CWIT’05), PP. 127 – 130, 2005.
Hoeper K. Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks / K. Hoeper, and G. Gong // Proceedings of the 5th International Conference on Ad-Hoc, Mobile, and Wireless Networks - ADHOC-NOW
, ser. LNCS 4104, PP. 224 – 237, 2006.
Hoeper K. Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes with Key Revocation / Katrin Hoeper, Guang Gong // Security and Privacy for Emerging Areas in Communication Networks (SecureComm 06), 2006.
Arboit G. A Localized Certificate Revocation Scheme for Mobile Ad Hoc Networks / G. Arboit, C. Cr.epeau, C.
R. Davis, and M. Maheswaran // Ad Hoc Network, vol.6, no.1, PP. 17 – 31, 2008.
Xinxin F. Key Revocation Based on Dirichlet Multinomial Model for Mobile Ad Hoc Networks / Xinxin F., and
Guang G. // Security and Privacy for Emerging Areas in Communication Networks (SecureComm 08), 2008.
Hoeper K. Monitoring-Based Key Revocation Schemes for Mobile Ad Hoc Networks: Design and Security
Analysis / Katrin Hoeper, Guang Gong // Security and Privacy for Emerging Areas in Communication Networks.
Waterloo, ON, N2L 3G1, Canada 2009.
Закон України “Про захист інформації в інформаційно-телекомунікаційних системах”.
Постанова від 29 березня 2006 р. – №373. – Київ. Про затвердження Правил забезпечення захисту інформації в інформаційних, телекомунікаційних та інформаційно-телекомунікаційних системах.
Shamir A. Identity Based Cryptosystems and Signature Schemes / A. Shamir // Proceedings of Advances in
Cryptology – CRYPTO 1984, ser. LNCS 196, PP. 47 – 53, 1984.
Hu Y.C. SEAD: secure efficient distance vector routing for mobile wireless ad hoc net-works / Hu Y.C., Johnson
D.B., Perrig A. // Proceedings of the 4th IEEE Work-shop on Mobile Computing Systems & Ap-plications
(WMCSA 2002). – 2002. – Calicoon(NY,USA). – PP. 3 – 13.
Papadimitratos P. Secure routing for mobile ad hoc networks / Papadimitratos P., Haas Z.J. // SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002) – San Antonio (TX, USA). – 2002.
Venkatraman L. Strategies for enhancing routing security in protocols for mobile ad hoc networks / Venkatraman
L., Agrawal D.P. // Journal of Parallel and Distributed Computting. – 2003. – Vol.63. – №2. – PP. 214–227.
Кулаков Ю.А. Алгоритмы безопасной маршрутизации для мобильных компьютерных сетей / Кулаков
Ю.А., Деревянчук А.О. // Проблеми інформатизації та управління, 3 (27). – Київ – 2009.
Tor Project. Homepage, 2011. url: http://www.torproject.org/.
Roger Dingledine, Nick Mathewson, and Paul Syverson. Tor: The second-generation onion router. In Proc. 13th
USENIX Security Symposium. The USENIX Association, 2004. url:
http://www.usenix.org/events/sec04/tech/dingledine.html/.
Ran Canetti and Hugo Krawczyk. Analysis of key-exchange protocols and their use for building secure channels.
In Birgit Ptzmann, editor, Advances in Cryptology { Proc. EUROCRYPT 2001, LNCS, volume 2045, PP. 453 -
Springer, 2001. doi:10.1007/3-540-44987-6 28.
Brian LaMacchia, Kristin Lauter, and Anton Mityagin. Stronger security of authenticated key exchange. In Willy
Susilo, Joseph K. Liu, and Yi Mu, editors, First International Conference on Provable Security (ProvSec) 2007, LNCS, volume 4784, PP. 1-16. Springer, 2007. doi:10.1007/978-3-540-75670-5 1.
Akyildiz I. F. Sankarasubramaniam, and E. Cayirci. A survey on sensor networks / I. F. Akyildiz, W. Su, Y. // IEEE Communications Magazine, 40(8): 102 – 114. – 2002.
J. Newsome, E. Shi, D. Song, and A. Perrig. The Sybil attack in sensor networks: Analysis and defenses. In Third
International Symposium on Information Processing in Sensor Networks, IPSN 2004, PP. 259 – 268, Monterey,
CA, United States. – 2004.
Yin J. Sybil attack detection in a hierarchical sensor network / J. Yin and S. K. Madria // In Third International
Conference on Security and Privacy in Communications Networks and the Workshops (SecureComm 2007), P P.
– 503. – 2007.
Yun J.-H. WODEM: Wormhole Attack Defense Mechanism in Wireless Sensor Networks / J.-H. Yun, I.-H. Kim,
J.-H. Lim, and S.-W. Seo. // In Ubiquitous Convergence Technology (ICUCT 2006), PP. 200 – 209. LNCS 4412. – 2007.
Anderson R. Key Infection: Smart Trust for Smart Dust / R. Anderson, H. Chan, and A. Perrig // In Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP’04), PP. 206 – 215. – 2004.
ISO/IEC 9797-3: 2011. Information technology – Security techniques – Message Authentication Codes (MACs)
– Part 3: Mechanisms using a universal hash-function.
Malan D. J. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography / D.
J. Malan, M. Welsh, and M. D. Smith // In First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (IEEE SECON 2004), PP. 71 – 80. – 2004.
Liu A. TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks / A. Liu and P.
Ning // In International Conference on Information Processing in Sensor Networks (IPSN ’08), PP. 245 – 256. – 2008.
Szczechowiak P. NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks / P.
Szczechowiak, L. Oliveira, M. Scott, M. Collier, and R. Dahab // In Wireless sensor networks, PP . 305 – 320.
LNCS 4913. – 2008.
Chevardin V. A pseudorandom bit generator based on elliptic curve transformations / V. Chevardin // Науково-
технічний журнал “Радіоелектронні і комп’ютерні системи” № 5(57). Харків “ХАІ”. – 2012 р. – C. 48 – 50.
Chevardin V. Deterministic random bit generator on elliptic curve transformations / V. Chevardin // Modern problems of radio engineering, telecommunications and computer science: proceedings of the XIth international
conference TCSET’2012. – Lviv-Slavske, Ukrain. – 2012. – P. 468.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).