Anonymous authentication and secure communication protocol for wireless mobile ad hoc networks

被引:7
|
作者
Rahman, Sk Md Mizanur [1 ]
Nasser, Nidal [1 ]
Inomata, Atsuo [2 ]
Okamoto, Takeshi [3 ]
Mambo, Masahiro [3 ]
Okamoto, Eiji [3 ]
机构
[1] Univ Guelph, Dept Comp & Informat Sci, Guelph, ON N1G 2W1, Canada
[2] Japan Sci & Technol Agcy, Chiyoda Ku, Tokyo 1000005, Japan
[3] Univ Tsukuba, Grad Sch Syst & Informat Engn, Tsukuba, Ibaraki 3058573, Japan
关键词
ad hoc network; anonymity; routing; pairing-based cryptography; security;
D O I
10.1002/sec.4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The main characteristic of a mobile ad hoc network (MANET) is its infrastructure-less, highly dynamic topology, which is subject to malicious traffic analysis. Malicious intermediate nodes in MANETs are a threat concerning security as well as anonymity of exchanged information. In this paper, we propose an anonymous on-demand routing protocol, called RINOMO, to protect anonymity and achieve security of nodes in MANETs. After successful authentication of the legitimate nodes in the network they can use their pseudo IDs for secure communication. Pseudo IDs of the nodes are generated considering pairing-based cryptography. Nodes can generate their pseudo IDs independently and dynamically without consulting with system administrator. As a result, RINOMO reduces pseudo IDs maintenance costs. Only trust-worthy nodes are allowed to take part in routing to discover a route. To ensure trustiness each node has to make authentication to its neighbors through the designed anonymous authentication process. Thus, RINOMO safely communicates between nodes without disclosing node identities. It also provides different desirable anonymous properties such as identity privacy, location privacy, route anonymity, and robustness against several attacks. Mathematical analysis of privacy loss is also evaluated and it shows there is no loss of privacy with respect to time. Thus, RINOMO is an anonymous robust protocol in MANETs. Copyright (C) 2008 John Wiley & Sons, Ltd.
引用
收藏
页码:179 / 189
页数:11
相关论文
共 50 条
  • [1] Anonymous secure communication in wireless mobile ad-hoc networks
    Rahman, Sk. Md. Mizanur
    Inomata, Atsuo
    Okamoto, Takeshi
    Mambo, Masahiro
    Okamoto, Eiji
    [J]. UBIQUITOUS CONVERGENCE TECHNOLOGY, 2007, 4412 : 140 - +
  • [2] SDAR: A secure distributed anonymous routing protocol for wireless and mobile ad hoc networks
    Boukerche, A
    El-Khatib, K
    Xu, L
    Korba, L
    [J]. LCN 2004: 29TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2004, : 618 - 624
  • [3] An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks
    Boukerche, A
    El-Khatib, K
    Xu, L
    Korba, L
    [J]. COMPUTER COMMUNICATIONS, 2005, 28 (10) : 1193 - 1203
  • [4] Secure and anonymous source routing protocol for wireless ad hoc networks
    Chen, Sisheng
    Xu, Li
    [J]. INTERNATIONAL SYMPOSIUM ON ADVANCES IN COMPUTER AND SENSOR NETWORKS AND SYSTEMS, PROCEEDINGS: IN CELEBRATION OF 60TH BIRTHDAY OF PROF. S. SITHARAMA IYENGAR FOR HIS CONTRIBUTIONS TO THE SCIENCE OF COMPUTING, 2008, : 9 - 14
  • [5] Secure and Anonymous Source Routing Protocol for Wireless Ad Hoc Networks
    Xu, Li
    Chen, Sisheng
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2009, 5 (01): : 56 - 56
  • [6] Anonymous and Secure Communication Protocol for Cognitive Radio Ad Hoc Networks
    Rahman, Sk Md Mizanur
    Kamruzzaman, S. M.
    Almogren, Ahmad
    Alelaiwi, Abdulhameed
    Alamri, Atif
    Alghamdi, Abdullah
    [J]. 2014 IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA (ISM), 2014, : 393 - 398
  • [7] Secure and anonymous mobile ad-hoc networks
    Mu, Y
    Zhang, FG
    Susilo, W
    [J]. 2005 13TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS JOINTLY HELD WITH THE 2005 7TH IEEE MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS 1 AND 2, 2005, : 1132 - 1136
  • [8] A secure communication protocol for ad-hoc wireless sensor networks
    Pearce, C
    Ma, VYM
    Bertok, P
    [J]. PROCEEDINGS OF THE 2004 INTELLIGENT SENSORS, SENSOR NETWORKS & INFORMATION PROCESSING CONFERENCE, 2004, : 79 - 84
  • [9] Secure Mutual Authentication for Ad hoc Wireless Networks
    Byung-Gi Kim
    Sang-Sun Hong
    [J]. The Journal of Supercomputing, 2005, 33 : 123 - 132
  • [10] Secure mutual authentication for ad hoc wireless networks
    Kim Byung-Gi
    Sang-Sun Hong
    [J]. The Journal of Supercomputing, 2005, 33 (1-2) : 123 - 132