CFP last date
20 May 2024
Reseach Article

An Approach to Secure Hierarchical Network using Joint Security and Routing Analysis

by Shivamalini L, Manjunath S S
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 28 - Number 8
Year of Publication: 2011
Authors: Shivamalini L, Manjunath S S
10.5120/3407-4752

Shivamalini L, Manjunath S S . An Approach to Secure Hierarchical Network using Joint Security and Routing Analysis. International Journal of Computer Applications. 28, 8 ( August 2011), 24-30. DOI=10.5120/3407-4752

@article{ 10.5120/3407-4752,
author = { Shivamalini L, Manjunath S S },
title = { An Approach to Secure Hierarchical Network using Joint Security and Routing Analysis },
journal = { International Journal of Computer Applications },
issue_date = { August 2011 },
volume = { 28 },
number = { 8 },
month = { August },
year = { 2011 },
issn = { 0975-8887 },
pages = { 24-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume28/number8/3407-4752/ },
doi = { 10.5120/3407-4752 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:14:15.062576+05:30
%A Shivamalini L
%A Manjunath S S
%T An Approach to Secure Hierarchical Network using Joint Security and Routing Analysis
%J International Journal of Computer Applications
%@ 0975-8887
%V 28
%N 8
%P 24-30
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In wired networks, building reliable and secured network connections is becoming extremely important. Security and Routing in wired networks remain challenging problem due to the complexity involved such as improper path discovery, congestion, network traffic and delay. In this paper, we first analyze the vulnerabilities for networks under different types of attacks. Then, we propose an Authentication and key assignment protocol to hierarchical routing to overcome those vulnerabilities with the security functionality to prevent malicious attacks. Hence, both Security and routing analysis is provided for Hierarchical Network Routing using Authentication and Integrity, and Key Assignment protocol. A class of continuous metrics to evaluate the vulnerability as a function of security and routing protocols used in networks has been formulated. Joint analysis of Security and Routing is used as it reveals the weaknesses in the network that remain undetected when Security and Routing protocols are analyzed independently. Interleaving has also been considered to increase performance. Performance metrics such as Packet Delivery Fraction, End-to-End Delay, and Packet Loss are considered.

References
  1. J.Kohl and C.Neuman, “RFC 1510: The Kerberos Network Authentication Service (V5),” Sep.1993.
  2. H.-Y. Chien and J.-K. Jan, “A hybrid authentication protocol for large Mobile network,” The Journal of Systems and Software, vol. 67, no. 2, pp. 123–130, Aug. 2003.
  3. G. Bella and E. Riccobene, “Formal analysis of the Kerberos authentication system,” Journal of Universal Computer Science, vol. 3, no. 12, pp. 1337–1381, Dec. 1997.
  4. A. Scedrov, F. Butler, A. D. Jaggard, and C. Walstad, “Formal analysis of Kerberos 5,” Theoretical Computer Science, vol. 36, no. 1–2, pp. 57–87, Nov. 2006.
  5. Sujata Doshi and Anand Eswaran, “A Hierarchical Security Architecture for Group-Communication in Sensor Networks”.
  6. Mohammad O. Pervaiz, Mihaela Cardei, and Jie Wu, “Routing Security in Ad Hoc Wireless Networks,” Network Security Scott Huang, David MacCallum, and Ding Zhu Du(Eds.), 2005.
  7. Seung Yi, Prasad Naldurg and Robin Kravets, “Security Aware Ad hoc routing for Wireless Networks”.
  8. Suraj Sharma and Sanjay Kumar Jena, “A Survey on Secure Hierarchical Routing Protocols in Wireless Sensor Networks,” ICCCS’11 February 2011.
  9. Chris Karlof and David Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures”.
  10. Zhe Chen, Shize Guo, Kangfeng Zheng and Yixian Yang, “Modeling of Man-in-the-Middle Attack in the Wireless Networks,” 2007 IEEE.
  11. Y. -C. Hu, A. Perrig, and D. B. Johnson, Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks, Infocom 2003.
  12. K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, A Secure Routing Protocol for Ad hoc Networks, The 10th IEEE Intl. Conf. on Network Protocol (ICNP), Nov. 2002.
  13. NS-2 Simulator. URL:http://www.isi.edu/nsnam/ns.
  14. Chao Lv, Maode Ma, Hui Li and Jianfeng Ma, “A Security Enhanced Authentication and Key Distribution Protocol for Wireless Networks,” 2010 IEEE.
  15. Patrick Tague, David Slater, Jason Rogers and Radha Poovendran, “Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis,” IEEE 2009.
  16. Huaizhi Li, Zhenliu Chen, Xiangyang Qin, Chengdong Li and Hui Tan, “Secure Routing in Wired Networks and Wireless Ad Hoc Networks, April 2002”, Department of Computer Science, University of Kentucky.
Index Terms

Computer Science
Information Sciences

Keywords

Authentication Hierarchical Routing Key Assignment Protocol Network Security Routers Vulnerability Attack