Privacy in Mobile Ad Hoc Networks

被引:0
|
作者
Vazram, B. Jhansi [1 ]
Kumari, V. Valli [2 ]
Murthy, J. V. R. [3 ]
机构
[1] Narasaraopeta Engg Coll, Dept CSE, Narasaraopeta 522601, Andhra Pradesh, India
[2] Andhra Univ, Dept CS&SE, Waltair 530003, Andhra Pradesh, India
[3] J N T Univ, Dept CSE, Kakinada 533033, Andhra Pradesh, India
关键词
Network security; anonymity; mobile adhoc networks; SECURE;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In mobile adhoc networks. generating and maintaining anonymity for any adhoc node is challenging because of the node mobility, dynamic network topology, cooperative nature of the network and broadcast nature of the communication media. Anonymity is provided to protect the communication, by hiding the participants as well as the message contents. Existing techniques based on cryptosystem and broadcasting cannot be easily adapted to MANET because of their extensive cryptographic computation and/or large communication overhead. In this paper, we first propose an unconditionally secure privacy preserving message authentication scheme (PPMAS) which uses Modified New variant ElGamal signature Scheme (MNES). Secondly we proposed privacy preserving communication protocol for MANET based on dynamic generation of pseudonyms, which are used in place of real nodes to provide anonymity.
引用
收藏
页码:336 / +
页数:2
相关论文
共 50 条
  • [1] On Address Privacy in Mobile Ad Hoc Networks
    Yanchao Zhang
    Kui Ren
    Mobile Networks and Applications, 2009, 14 : 188 - 197
  • [2] On Address Privacy in Mobile Ad Hoc Networks
    Zhang, Yanchao
    Ren, Kui
    MOBILE NETWORKS & APPLICATIONS, 2009, 14 (02): : 188 - 197
  • [3] SPM: Source Privacy for Mobile Ad Hoc Networks
    Jian Ren
    Yun Li
    Tongtong Li
    EURASIP Journal on Wireless Communications and Networking, 2010
  • [4] Providing Source Privacy in Mobile Ad Hoc Networks
    Ren, Jian
    Li, Yun
    Li, Tongtong
    2009 IEEE 6TH INTERNATIONAL CONFERENCE ON MOBILE ADHOC AND SENSOR SYSTEMS (MASS 2009), 2009, : 513 - 522
  • [5] Privacy addressing and autoconfiguration for mobile ad hoc networks
    Li, Longjiang
    Mao, Yuming
    Leng, Supeng
    COMPUTER COMMUNICATIONS, 2011, 34 (03) : 423 - 428
  • [6] SPM: Source Privacy for Mobile Ad Hoc Networks
    Ren, Jian
    Li, Yun
    Li, Tongtong
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2010,
  • [7] Privacy-Preserving Scheme for Mobile Ad Hoc Networks
    Michalas, Antonis
    Oleshchuk, Vladimir A.
    Komninos, Nikos
    Prasad, Neeli R.
    2011 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2011,
  • [8] Formal Analysis of Privacy for Routing Protocols in Mobile Ad Hoc Networks
    Chretien, Remy
    Delaune, Stephanie
    PRINCIPLES OF SECURITY AND TRUST, POST 2013, 2013, 7796 : 1 - 20
  • [9] Using camouflaging mobility to protect privacy in mobile ad hoc networks
    Tang, Lei
    Hong, Xiaoyan
    Vrbsky, Susan
    SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (06) : 580 - 594
  • [10] Camouflaging Mobility for Itinerary Privacy in Mobile Ad-hoc Networks
    Tang, Lei
    Hong, Xiaoyan
    Vrbsky, Susan
    2008 IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS, VOLS 1 AND 2, 2008, : 783 - 789