Digital Signature Tech
Digital Signature Tech
proving
that a message is effectively coming from a given sender, much like a
signature on a paper document. Digital signatures are computed based on the
documents (message/information) that need to be signed and on some private
message, a hash function is applied to the message to obtain the message digest. A
hash function, in this context, takes an arbitrary-sized message as input and
produces a fixed-size message digest as output. Among the commonly used hash
functions in practice are Message Digest 5 (MD-5) and Secure Hash Algorithm
(SHA). These algorithms are fairly sophisticated and ensure that it is highly
improbable for two different messages to be mapped to the same hash value.
Using Digital Signature Authentication, Integrity and Non Repudiation can be
enforced. So digital signature can be used to verify if a node is legitimate to respond
in the network and this digital signature technique is used to authenticate all
legitimate nodes of the network, if any malicious node is willing to be part of the
network then the access to that malicious node is restricted.
As shown in figure 4.1, during route creation and maintenance phase, nodes
appends their digital signature to the RREQ and RREP packets. When the sender
broadcasts RREQ in the network, it appends its signature in the signature column of
RREQ packet. All further recipients of the packets verify the digital signature of
previous nodes by list of all nodes and their respective digital signature. If the
signature is matched then the recipient node can be sure that it is a trusted node in
the network. If the signature is found to be duplicated or the signature is found to be
absent in the signature column then it is considered to be malicious node. Thus, only
legitimate nodes can take part in the process of route creation and maintenance. It
will also be able to handle packet modification and single malicious node problem.
The proposed algorithm is as follows (Sharma & Trivedi, 2011):