ASRPAKE: An anonymous secure routing protocol with authenticated key exchange for wireless ad hoc networks

被引:19
|
作者
Lin, Xiaodong [1 ]
Lu, Rongxing [2 ]
Zhu, Haojin [1 ]
Ho, Pin-Han [1 ]
Shen, Xuemin [1 ]
Cao, Zhenfu [2 ]
机构
[1] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
[2] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai, Peoples R China
关键词
wireless ad hoc network; anonymous; security; routing protocol; authenticated key exchange; snare attack;
D O I
10.1109/ICC.2007.211
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we present a novel anonymous secure routing protocol for mobile ad hoc networks (MANETs). The proposed protocol not only provides anonymity from all the intermediate nodes, but also integrates the authenticated key exchange mechanisms into the routing algorithm design. Furthermore, a new attack on anonymous services, called snare attack, is introduced, where a compromised node lures a very important node (VIN) into communicating with him and traces back to the VIN by following the route path. An adversary can then snare the VIN and launch Decapitation Strike on the VIN. Finally, we present a novel DECOY mechanism as a countermeasure to enhance anonymity of VINs and defeat snare attack.
引用
收藏
页码:1247 / +
页数:2
相关论文
共 50 条
  • [1] A secure anonymous routing protocol with authenticated key exchange for ad hoc networks
    Lu, Rongxing
    Cao, Zhenfu
    Wang, Licheng
    Sun, Congkai
    [J]. COMPUTER STANDARDS & INTERFACES, 2007, 29 (05) : 521 - 527
  • [2] Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks
    Hwang, Min-Shiang
    Li, Chun-Ta
    Chu, Yen-Ping
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2008, 23 (03): : 227 - 234
  • [3] An Anonymous Routing Protocol with Authenticated Key Establishment in Wireless Ad Hoc Networks
    Yuan, Wei
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [4] Secure and Anonymous Source Routing Protocol for Wireless Ad Hoc Networks
    Xu, Li
    Chen, Sisheng
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2009, 5 (01): : 56 - 56
  • [5] Secure and anonymous source routing protocol for wireless ad hoc networks
    Chen, Sisheng
    Xu, Li
    [J]. INTERNATIONAL SYMPOSIUM ON ADVANCES IN COMPUTER AND SENSOR NETWORKS AND SYSTEMS, PROCEEDINGS: IN CELEBRATION OF 60TH BIRTHDAY OF PROF. S. SITHARAMA IYENGAR FOR HIS CONTRIBUTIONS TO THE SCIENCE OF COMPUTING, 2008, : 9 - 14
  • [6] Secure Authenticated Key Establishment Protocol for Ad hoc Networks
    Prakash, A. John
    Uthariaraj, V. Rhymend
    [J]. NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 87 - 94
  • [7] SDAR: A secure distributed anonymous routing protocol for wireless and mobile ad hoc networks
    Boukerche, A
    El-Khatib, K
    Xu, L
    Korba, L
    [J]. LCN 2004: 29TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2004, : 618 - 624
  • [8] An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks
    Boukerche, A
    El-Khatib, K
    Xu, L
    Korba, L
    [J]. COMPUTER COMMUNICATIONS, 2005, 28 (10) : 1193 - 1203
  • [9] A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks
    Zhang, Ke
    Xu, Kai
    Wei, Fushan
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [10] Secure anonymous routing in trust and clustered wireless ad hoc networks
    Chen, Sisheng
    Xu, Li
    Chen, Zhide
    [J]. 2007 SECOND INTERNATIONAL CONFERENCE IN COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1 AND 2, 2007, : 488 - 492