Skip to main content

Exploiting Multiple Paths in Multi-hop Co-operative Ad-Hoc Networks for Providing Security without Trusted Third Party

  • Conference paper
  • First Online:
Advanced Information Networking and Applications (AINA 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 926))

  • 1778 Accesses

Abstract

Ensuring secure communication in large scale wireless networks is a challenging issue, especially when the nodes participating in the network itself cannot be trusted fully. This situation is very much pertinent in the case of multi-hop wireless cooperative networks, where the nodes co-operate with each other to support multi-hop communication in the network. In such networks, assuming the presence of a trusted third party to provide key exchange and authentication services in the network is not viable. Additionally, the classical Diffie-Hellman based key establishment mechanism as such cannot be used because of Man-In-The-Middle and impersonation attacks, as the nodes participating in a multi-hop path from source to destination cannot be trusted. In this paper, we investigate the use of the multi-paths and secret sharing in multi-hop cooperative adhoc networks to provide practical secure communication between the nodes in the network. We propose a couple of routing algorithms that give multiple-paths to send different segments of information required to be communicated securely, under various behavioral models of the participating nodes. The simulation results show that the majority of times, we are able to find the multiple paths in the network through which the different segments of a piece of information can be sent to achieve desirable security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979). https://doi.org/10.1145/359168.359176

    Article  MathSciNet  MATH  Google Scholar 

  2. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: 2003 Symposium on Security and Privacy, pp. 197–213, May 2003

    Google Scholar 

  3. Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A key management scheme for wireless sensor networks using deployment knowledge. In: IEEE INFOCOM 2004, vol. 1, p. 597, March 2004

    Google Scholar 

  4. Du, W., Deng, J., Han, Y.S., Varshney, P.K., Katz, J., Khalili, A.: A pairwise key predistribution scheme for wireless sensor networks. ACM Trans. Inf. Syst. Secur. 8(2), 228–258 (2005). https://doi.org/10.1145/1065545.1065548

    Article  Google Scholar 

  5. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41–47. ACM (2002)

    Google Scholar 

  6. Ling, H., Znati, T.: End-to-end pairwise key establishment using multi-path in wireless sensor network. In: IEEE Global Telecommunications Conference on GLOBECOM 2005, vol. 3, p. 5, November 2005

    Google Scholar 

  7. Yin, L., Qiao-Yan, W., Zheng-Ping, J., Meng, S.: Secure pairwise key establishment for key predistribution in wireless sensor networks. In: 2012 International Conference on Computer Science and Service System (CSSS), pp. 822–825. IEEE (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ashutosh Bhatia .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dinesh Ram Kumar, T., Bhatia, A., Hansdah, R.C. (2020). Exploiting Multiple Paths in Multi-hop Co-operative Ad-Hoc Networks for Providing Security without Trusted Third Party. In: Barolli, L., Takizawa, M., Xhafa, F., Enokido, T. (eds) Advanced Information Networking and Applications. AINA 2019. Advances in Intelligent Systems and Computing, vol 926. Springer, Cham. https://doi.org/10.1007/978-3-030-15032-7_105

Download citation

Publish with us

Policies and ethics