Anonymity enabling scheme for wireless ad hoc networks

被引:0
|
作者
Boukerche, A [1 ]
El-Khatib, K [1 ]
Xu, L [1 ]
Korba, L [1 ]
机构
[1] Univ Ottawa, PARADISE Res Lab, SITE, Ottawa, ON K1N 6N5, Canada
关键词
routing; ad hoc; security; network simulator ns-2; wireless networks;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the advances of wireless and mobile telecommunications, anonymity is becoming one, the pressing issues for the design of future wireless ad hoc networks. In a wireless ad hoc network, communicating nodes usually seek the help of other intermediate nodes to establish communication channels. In such an environment, malicious intermediate nodes can be a threat to the security and/or anonymity of the exchanged data between the mobile nodes. While data encryption can protect the content exchanged between nodes, routing information may reveal valuable information about end users and their relationships. This paper proposes an anonymous routing protocol, similar to. onion routing used in wired networks. Our protocol includes also a mechanism to establish trust and avoid untrustworthy nodes during the route discovery process. The major objective of our protocol is to allow trustworthy intermediate nodes to participate in the routing protocol without jeopardizing the anonymity of the communicating nodes.
引用
收藏
页码:136 / 140
页数:5
相关论文
共 50 条
  • [1] On measuring anonymity for wireless mobile ad-hoc networks
    Huang, Dijiang
    31ST IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2006, : 779 - 786
  • [2] Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
    Boukerche, Azzedine
    El-Khatib, Khalil
    Xu, Li
    Korba, Larry
    PERFORMANCE EVALUATION, 2006, 63 (11) : 1094 - 1109
  • [3] Anonymity and Security in Mobile Ad Hoc Networks
    Bolla, Jhansi Vazram
    Vatsavayi, Valli Kumari
    Murthy, J. V. R.
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, 2012, 7154 : 71 - +
  • [4] Investigation of the block ACK scheme in wireless ad hoc networks
    Li, Tianji
    Ni, Qiang
    Xiao, Yang
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2006, 6 (06): : 877 - 888
  • [5] Cluster based security scheme in wireless Ad Hoc networks
    State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China
    Jisuanji Yanjiu yu Fazhan, 2006, 2 (238-243):
  • [6] An efficient anycasting scheme in ad-hoc wireless networks
    Chen, SC
    Dow, CR
    Chen, SK
    Lin, JH
    Hwang, SF
    CCNC: 2005 2ND IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, 2005, : 178 - 183
  • [7] A New Cooperative MAC Scheme for Wireless Ad Hoc Networks
    Li, Lixin
    Zhang, Huisheng
    ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 1, 2008, : 551 - +
  • [8] A routing scheme of ad hoc wireless networks for pervasive computing
    Liang, Ming
    Xie Guihai
    Gang, Zhao
    Jia Huanfeng
    ISTM/2007: 7TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-7, CONFERENCE PROCEEDINGS, 2007, : 3833 - 3836
  • [9] A generic distributed broadcast scheme in ad hoc wireless networks
    Wu, J
    Dai, F
    IEEE TRANSACTIONS ON COMPUTERS, 2004, 53 (10) : 1343 - 1354
  • [10] Proactive channel access scheme for wireless ad hoc networks
    Fazil, Adnan
    Hasan, Aamir
    Qureshi, Ijaz Mansoor
    Shafi, Qaisar
    IET COMMUNICATIONS, 2019, 13 (13) : 1893 - 1901