International Journal of Recent Technology and Engineering (IJRTE)
ISSN: 2277-3878, Volume-8 Issue-2, July 2019
412
Published By:
Blue Eyes Intelligence Engineering
& Sciences Publication
Retrieval Number: B1503078219/19©BEIESP
DOI: 10.35940/ijrte.B1503.078219
Abstract: Cryptography as a stream is very important for
communication security. Cryptography provides many goals for
communication security and authentication is one of them.
Routing is an integral part of computer networks and router
security is extremely important because routing provides suitable
path to the traffic generated in the network. Authentication is very
important for routing protocols. In this paper we discuss security
flaws in routing authentication and provide a unique solution
which is never presented to overcome this problem. We also
discuss the security analysis of the proposed method which proves
that the proposed method is robust in various aspects. The
proposed method provides many advantages and the method is so
simple that anybody can use it.
Index Terms: AES (Advance Encryption Standard), Dynamic
Routing, Exterior Gateway Protocol (EGP), Hash Functions,
Interior Gateway Protocol (IGP), MD 5 hash
I. INTRODUCTION
In the fast and modern world where data communication is a
necessity of life, cryptography plays a key role by providing
data communication security. Cryptography is a collection of
algorithms, procedures and techniques required for
communication security. Cryptanalysis is opposite to
cryptography because it deals with breaking the codes by
various means. Cryptography and cryptanalysis are jointly
knows as cryptology. Cryptography provides data security
through some objectives and they are known as cryptography
goals as shown in figure 1 [1-2]. Confidentiality is the first
goal which makes sure that only authorized receiver can
access the data. Many encryption algorithms are there to
provide confidentiality. Data integrity is second in the list and
it is responsible for the prevention of any unauthorized
alteration or modification of data. Hash functions are used to
validate data integrity. Authentication is the third goal and we
talk about it in detail in the later section of this paper. At the
basic level, authentication is a service which makes sure that
communication is in between legitimate entities. Passwords,
thumb impression etc are used for it. Non repudiation is the
fourth goal and it makes sure that a participating entity, in a
communication process, can’t deny previously made
commitments. Digital signatures are used for it.
Revised Manuscript Received on July 06, 2019.
Varun Shukla, Department of Electronics & Communication, PSIT,
Kanpur, India.
Atul Chaturvedi, Department of Mathematics, PSIT, Kanpur, India.
Neelam Srivastava, Department of Electronics & Communication,
REC, Kannauj, India.
Figure 1. Showing cryptographic goals required for
secure communication.
For communication process, routing is the core part. Routing
can be classified as static routing and dynamic routing [3]. In
static routing, routers are configured by network
administrator. Usually static routing is preferred for small
networks requiring only two or three routers. One promising
application of static routing is to define an exit point when no
existing routers are left. It can also be used as a backup and
the CPU overheads are very low. The drawback is that the
administrator can do mistakes when numbers of routers are
high. On the other side, in dynamic routing (also known as
adaptive routing), as the name suggests, a router can transfer
data to a route based on present conditions. Many protocols
are there in this category and we will discuss them in a later
section of this paper. A dynamically configured network
adapts changes very quickly because each router declares
their presence to the other routers present on the network. The
rest of this paper organized as follows: In section 2, we talk
about authentication and dynamic routing protocols in brief.
In section 3, we discuss security flaws with some existing
solutions. In section 4, we provide proposed solution. Section
5 is all about the security analysis of the proposed method.
Section 6 takes care of the advantages of the proposed
method. Paper ends with conclusion and future scope which is
in section 7.
II. AUTHENTICATION & DYNAMIC ROUTING
PROTOCOLS
In a peer to peer or in group communication, it is essential
that participating entities must recognize each other via some
specific procedure. Broadly, authentication can be classified
in entity authentication and data origin authentication [1].
Authentication Aspects of Dynamic Routing
Protocols: Associated Problem & Proposed
Solution
Varun Shukla, Atul Chaturvedi, Neelam Srivastava
Cryptographic goals
Confidentiality: Encryption algorithms
Data integrity: Hash functions
Authentication: Passwords
Non repudiation: Digital signatures