Anonymous authentication and secure communication protocol for wireless mobile ad hoc networks

被引:7
|
作者
Rahman, Sk Md Mizanur [1 ]
Nasser, Nidal [1 ]
Inomata, Atsuo [2 ]
Okamoto, Takeshi [3 ]
Mambo, Masahiro [3 ]
Okamoto, Eiji [3 ]
机构
[1] Univ Guelph, Dept Comp & Informat Sci, Guelph, ON N1G 2W1, Canada
[2] Japan Sci & Technol Agcy, Chiyoda Ku, Tokyo 1000005, Japan
[3] Univ Tsukuba, Grad Sch Syst & Informat Engn, Tsukuba, Ibaraki 3058573, Japan
关键词
ad hoc network; anonymity; routing; pairing-based cryptography; security;
D O I
10.1002/sec.4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The main characteristic of a mobile ad hoc network (MANET) is its infrastructure-less, highly dynamic topology, which is subject to malicious traffic analysis. Malicious intermediate nodes in MANETs are a threat concerning security as well as anonymity of exchanged information. In this paper, we propose an anonymous on-demand routing protocol, called RINOMO, to protect anonymity and achieve security of nodes in MANETs. After successful authentication of the legitimate nodes in the network they can use their pseudo IDs for secure communication. Pseudo IDs of the nodes are generated considering pairing-based cryptography. Nodes can generate their pseudo IDs independently and dynamically without consulting with system administrator. As a result, RINOMO reduces pseudo IDs maintenance costs. Only trust-worthy nodes are allowed to take part in routing to discover a route. To ensure trustiness each node has to make authentication to its neighbors through the designed anonymous authentication process. Thus, RINOMO safely communicates between nodes without disclosing node identities. It also provides different desirable anonymous properties such as identity privacy, location privacy, route anonymity, and robustness against several attacks. Mathematical analysis of privacy loss is also evaluated and it shows there is no loss of privacy with respect to time. Thus, RINOMO is an anonymous robust protocol in MANETs. Copyright (C) 2008 John Wiley & Sons, Ltd.
引用
收藏
页码:179 / 189
页数:11
相关论文
共 50 条
  • [21] High Secure Routing Protocol with Authentication and Confidentiality Increased in Wireless Ad Hoc Networks
    Taheri, Mahdi
    Bagheri, Mahdi
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2014, 39 (02) : 1135 - 1145
  • [22] High Secure Routing Protocol with Authentication and Confidentiality Increased in Wireless Ad Hoc Networks
    Mahdi Taheri
    Mahdi Bagheri
    [J]. Arabian Journal for Science and Engineering, 2014, 39 : 1135 - 1145
  • [23] Performance study of a secure routing protocol in wireless mobile ad hoc networks
    Alsaadi, Mohamad Y.
    Qian, Yi
    [J]. 2007 2ND INTERNATIONAL SYMPOSIUM ON WIRELESS PERVASIVE COMPUTING, VOLS 1 AND 2, 2007, : 425 - +
  • [24] An Anonymous Authentication and Communication Protocol for Wireless Mesh Networks
    Sen, Jaydip
    [J]. ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 4, 2011, 193 : 580 - 592
  • [25] A lightweight authentication protocol for mobile ad hoc networks
    Lu, B
    Pooch, UW
    [J]. ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 2, 2005, : 546 - 551
  • [26] ASRPAKE: An anonymous secure routing protocol with authenticated key exchange for wireless ad hoc networks
    Lin, Xiaodong
    Lu, Rongxing
    Zhu, Haojin
    Ho, Pin-Han
    Shen, Xuemin
    Cao, Zhenfu
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1247 - +
  • [27] A Chaos-Based Keyed Hash Function for Secure Protocol and Messege Authentication in Mobile Ad Hoc Wireless Networks
    Chankasame, Winai
    San-Um, Wimol
    [J]. 2015 SCIENCE AND INFORMATION CONFERENCE (SAI), 2015, : 1357 - 1364
  • [28] A secure incentive protocol for mobile ad hoc networks
    Zhang, Yanchao
    Lou, Wenjing
    Liu, Wei
    Fang, Yuguang
    [J]. WIRELESS NETWORKS, 2007, 13 (05) : 569 - 582
  • [29] Designing secure wireless mobile ad hoc networks
    Balakrishnan, V
    Varadharajan, V
    [J]. AINA 2005: 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, 2005, : 5 - 8
  • [30] A secure incentive protocol for mobile ad hoc networks
    Yanchao Zhang
    Wenjing Lou
    Wei Liu
    Yuguang Fang
    [J]. Wireless Networks, 2007, 13 : 569 - 582