Two-Party Key Agreement Protocol Without Central Authority for Mobile Ad Hoc Networks

Two-Party Key Agreement Protocol Without Central Authority for Mobile Ad Hoc Networks

Asha Jyothi Ch, Narsimha G.
Copyright: © 2019 |Volume: 13 |Issue: 4 |Pages: 21
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781522564638|DOI: 10.4018/IJISP.2019100105
Cite Article Cite Article

MLA

Ch, Asha Jyothi, and Narsimha G. "Two-Party Key Agreement Protocol Without Central Authority for Mobile Ad Hoc Networks." IJISP vol.13, no.4 2019: pp.68-88. http://doi.org/10.4018/IJISP.2019100105

APA

Ch, A. J. & Narsimha G. (2019). Two-Party Key Agreement Protocol Without Central Authority for Mobile Ad Hoc Networks. International Journal of Information Security and Privacy (IJISP), 13(4), 68-88. http://doi.org/10.4018/IJISP.2019100105

Chicago

Ch, Asha Jyothi, and Narsimha G. "Two-Party Key Agreement Protocol Without Central Authority for Mobile Ad Hoc Networks," International Journal of Information Security and Privacy (IJISP) 13, no.4: 68-88. http://doi.org/10.4018/IJISP.2019100105

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Key agreement (KA) without the use of a central authority is an elementary cryptographic problem to ensure security in MANETs because such networks consist of movable nodes with no fixed infrastructure or no central administration. The nodes communicate via wireless channels that are more prone to security attacks. A majority of the existing KA protocols assume the existence of central authority and hence, not perfectly suitable for a MANET environment. Proposed 2P-NCKA (Two-Party Non-Central authority KA) protocol creates a secret key between two users for a MANET which does not assume the use of a central authority and a prior password. It uses pairings, a verifiable secret sharing scheme and routing protocol. The AOPMDV protocol allows transmission of multiple packets across multiple node-disjoint paths in parallel so that one packet is in each path. This article also cryptanalyzes Li's KA protocol and has proven its vulnerability towards a man-in-the-middle (MITM) attack. The 2P-NCKA protocol is secure against MITM attacks and all known attacks and addresses problems of Li's protocol with a small increase in execution time.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.