Authentication Aspects of Dynamic Routing Protocols: Associated Problem & Proposed Solution
Varun Shukla1, Atul Chaturvedi2, Neelam Srivastava3 

1Varun Shukla, Department of Electronics & Communication, PSIT, Kanpur, India.
2Atul Chaturvedi, Department of Mathematics, PSIT, Kanpur, India.
3Neelam Srivastava, Department of Electronics & Communication, REC, Kannauj, India.

Manuscript received on 07 March 2019 | Revised Manuscript received on 13 March 2019 | Manuscript published on 30 July 2019 | PP: 412-419 | Volume-8 Issue-2, July 2019 | Retrieval Number: B1503078219/19©BEIESP | DOI: 10.35940/ijrte.B1503.078219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cryptography as a stream is very important for communication security. Cryptography provides many goals for communication security and authentication is one of them. Routing is an integral part of computer networks and router security is extremely important because routing provides suitable path to the traffic generated in the network. Authentication is very important for routing protocols. In this paper we discuss security flaws in routing authentication and provide a unique solution which is never presented to overcome this problem. We also discuss the security analysis of the proposed method which proves that the proposed method is robust in various aspects. The proposed method provides many advantages and the method is so simple that anybody can use it.
Index Terms: AES (Advance Encryption Standard), Dynamic Routing, Exterior Gateway Protocol (EGP), Hash Functions, Interior Gateway Protocol (IGP), MD 5 hash

Scope of the Article: Authentication, Authorization, Accounting