By Topic

A novel signature scheme to secure distributed dynamic address configuration protocol in mobile ad hoc networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Ghosh, U. ; Dept. of Electron. & Electr. Commun. Eng., Indian Inst. of Technol., Kharagpur, India ; Datta, R.

Secure distributed IP addressing is a prime requirement in mobile ad hoc networks (MANETs) for unicast communication. Several types of security threats have been observed in most of the proposed dynamic addressing approaches as they rely on broadcasting for address solicitation and/ or duplicate address detection. In this paper, we propose an ID based distributed dynamic IP configuration scheme to securely allocate IP addresses to the authorized hosts for a MANET without broadcasting over the entire network. Each host can generate unique IP addresses from its own IP address and can assign those addresses to the new nodes. In addition, we propose a novel signature scheme that authenticates and lessens the security threats associated with dynamic IP configuration. Proof of correctness of the proposed signature scheme verifies that the scheme is secure against any forgery attack. Extensive simulation results show that the proposed addressing scheme has low overhead and fairly good addressing latency with added security mechanisms as compared to similar existing dynamic configuration schemes. Moreover, the proposed scheme is robust and can efficiently solve the problem of network partitions and mergers.

Published in:

Wireless Communications and Networking Conference (WCNC), 2012 IEEE

Date of Conference:

1-4 April 2012