Secure and Anonymous Source Routing Protocol for Wireless Ad Hoc Networks

被引:0
|
作者
Xu, Li [1 ]
Chen, Sisheng [1 ]
机构
[1] Fujian Normal Univ, Key Lab Network Secur & Cryptol, Sch Math & Comp Sci, Fuzhou 350007, Peoples R China
关键词
D O I
10.1080/15501320802554539
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless ad hoc network is formed by a group of mobile hosts that communicate through radio transmissions. In the hostile environment, this kind of network is vulnerable to traffic analysis which allows the adversary to trace the routing messages and the sensitive data packets. So, anonymous routing protocol for ad hoc networks is an important thing and has attracted more and more attention recently. In this paper, we propose a novel, secure, and anonymous source routing, called SADSR (Secure and Anonymous Dynamic Source Routing) based on DSR. During the routing request of the SADSR, in order to hide the identity, the source node uses its current pseudonym to sponsor the routing request. And it uses the hash value of the changing share key between the source and destination as the tag of the destination. Meanwhile, it employs an initialized Bloom Filter as the routing record table to record the route. When the intermediate nodes receive the routing request, it randomly chooses a secret key and adds its identity into the Bloom Filter with seeding the secret key. So, when the destination node receives the routing request, the Bloom Filter has recorded the route information. Because the feature of the pseudonym employed in our scheme, the destination node can authenticate the source node and updates their share secret key when it replies to the routing request. During the routing reply phase, the intermediate node can determine whether it is the router by checking the Bloom Filter in the reply packet. The router applies the pseudonym based signature to protect the message during the routing reply phase, which makes sure that the neighborhood node en route can authenticate the upstream node and does not disclose its identity. SADSR also contains the routing maintenance and secure anonymous data transmission which are separately used by the end-to-end validate mechanism and HMAC strategy. The performance of security and anonymity of SADSR is analyzed by both in theory and simulation. Compared to the other anonymous routing protocols, SADSR is not only an anonymous routing protocol, but also a secure one. It can provide authentication and integrity, anonymous neighborhood, identity anonymity, and route anonymity. The simulation results using NS-2 indicate that though SADSR is a secure and anonymous routing protocol, but the efficiency of SADSR is close to the secure routing protocol SDSR and anonymous routing protocol AnonDSR.
引用
收藏
页码:56 / 56
页数:1
相关论文
共 50 条
  • [1] Secure and anonymous source routing protocol for wireless ad hoc networks
    Chen, Sisheng
    Xu, Li
    [J]. INTERNATIONAL SYMPOSIUM ON ADVANCES IN COMPUTER AND SENSOR NETWORKS AND SYSTEMS, PROCEEDINGS: IN CELEBRATION OF 60TH BIRTHDAY OF PROF. S. SITHARAMA IYENGAR FOR HIS CONTRIBUTIONS TO THE SCIENCE OF COMPUTING, 2008, : 9 - 14
  • [2] SDAR: A secure distributed anonymous routing protocol for wireless and mobile ad hoc networks
    Boukerche, A
    El-Khatib, K
    Xu, L
    Korba, L
    [J]. LCN 2004: 29TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2004, : 618 - 624
  • [3] An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks
    Boukerche, A
    El-Khatib, K
    Xu, L
    Korba, L
    [J]. COMPUTER COMMUNICATIONS, 2005, 28 (10) : 1193 - 1203
  • [4] ASRPAKE: An anonymous secure routing protocol with authenticated key exchange for wireless ad hoc networks
    Lin, Xiaodong
    Lu, Rongxing
    Zhu, Haojin
    Ho, Pin-Han
    Shen, Xuemin
    Cao, Zhenfu
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1247 - +
  • [5] Secure anonymous routing in trust and clustered wireless ad hoc networks
    Chen, Sisheng
    Xu, Li
    Chen, Zhide
    [J]. 2007 SECOND INTERNATIONAL CONFERENCE IN COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1 AND 2, 2007, : 488 - 492
  • [6] Secure anonymous routing in clustered multihop wireless ad hoc networks
    Qian, Lijun
    Song, Ning
    Li, Xiangfang
    [J]. 2006 40TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS, VOLS 1-4, 2006, : 1629 - 1634
  • [7] Anonymous routing protocol for wireless Ad Hoc networks with synchronized pseudonym
    Liu Jie
    Wang Xiaoming
    [J]. 2011 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION AND INDUSTRIAL APPLICATION (ICIA2011), VOL III, 2011, : 319 - 323
  • [8] A Secure Source Routing Protocol for Mobile Ad Hoc Networks
    Mahmood, Baban A.
    Manivannan, D.
    [J]. INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2020, 11 (03): : 212 - 234
  • [9] Anonymous routing protocol for wireless Ad Hoc networks with synchronized pseudonym
    Liu Jie
    Wang Xiaoming
    [J]. 2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL VIII, 2010, : 319 - 323
  • [10] A secure anonymous routing protocol with authenticated key exchange for ad hoc networks
    Lu, Rongxing
    Cao, Zhenfu
    Wang, Licheng
    Sun, Congkai
    [J]. COMPUTER STANDARDS & INTERFACES, 2007, 29 (05) : 521 - 527