Exchanging Path Oriented N-Generated Keys Via Alternative Path for Secured Communication in MANETs
Chandrakant N, Dept of CSE, UVCE, Bangalore University, Bangalore, India.
Manuscript received on October 12, 2013. | Revised Manuscript Received on October 20, 2013. | Manuscript published on October 20, 2013. | PP: 44-46 | Volume-1, Issue-11, October 2013. | Retrieval Number: K03411011113/2013©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: In this paper, communication in a MANET works on key sharing called KEY1 and KEY2 to establish link between nodes. Here source node will generate and stores KEY2 and destination node will generate and stores KEY1. When source node initiates communication for destination, source node will send a request packet to destination via shortest/less cost path (PATH1). Here PATH1 can have many nodes and each node will generate a secret key whenever it receives a packet for first time for a particular session. Now that packet should take this key and move ahead to next node, similarly, next node too generates a secret key and appends to this packet, this task will be continued until packet reaches its destination, these all intermediate keys (IK) are merged (like applying arithmetic or logical operation) to form a unique key in the destination called as IKn2 where n>2 i.e excluding source node and destination node. Both side communications should have respective node’s keys. i.e source packet should have KEY1,IKn2 and destination packet should have KEY2,IKn2. KEY1, KEY2 and IKn2 will expire after each session ends. So keys are shared before communication establishment.
Keywords: MANET, IKn2, Alternative Path, Intermediate Key