A Novel Solution based on Mobile Agent for Anonymity in Wireless and Mobile Ad hoc Networks

被引:0
|
作者
Boukerche, Azzedine [1 ]
Ren, Yonglin [1 ]
机构
[1] Univ Ottawa, Sch Informat Technol & Engn, Ottawa, ON, Canada
关键词
Wireless Security; Wireless Ad hoc Network; Anonymity; Mobile Agent; Secure Protocol;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In ad hoc networks, a collection of wireless hosts cooperates to transmit packets to each other, even if they are beyond their direct wireless transmission range. Recently, many proposed routing protocols provide routing services for ad hoc networks. In addition, significant attention has been devoted to developing secure and anonymous routing protocols against a variety of possible attacks. In such an environment, malicious nodes will jeopardize the security of wireless ad hoc networks if the issues of secure data exchange are not properly handled. In this paper, we discuss the mobile agent technique and then propose a novel solution for secure and anonymous communication based on employing a mobile agent in wireless and mobile ad hoc networks, which we refer to as ARMA. Furthermore, we present the Malicious Encryption and Malicious ID attacks, as well as other attacks, and note how our scheme is robust to them. Through the proof of protocol correctness, our protocol is analyzed to show how it offers provable security properties.
引用
收藏
页码:86 / 94
页数:9
相关论文
共 50 条
  • [31] Mobile backbone synthesis for ad hoc wireless networks
    Ju, Huei-jiun
    Rubin, Zhak
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2007, 6 (12) : 4285 - 4298
  • [32] An agent based intrusion detection model for mobile ad hoc networks
    Reshmi, B. M.
    Manvi, S. S.
    Bhagyavati
    MOBILE INFORMATION SYSTEMS, 2006, 2 (04) : 169 - 191
  • [33] Designing secure wireless mobile ad hoc networks
    Balakrishnan, V
    Varadharajan, V
    AINA 2005: 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, 2005, : 5 - 8
  • [34] Stability of wireless relays in mobile ad hoc networks
    Ye, ZZ
    Hua, YB
    2005 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1-5: SPEECH PROCESSING, 2005, : 505 - 508
  • [35] An evaluation of connectivity in mobile wireless ad hoc networks
    Santi, P
    Blough, DM
    INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, : 89 - 98
  • [36] On Link Reliability in Wireless Mobile Ad Hoc Networks
    Tantra, Juki Wirawan
    Foh, Chuan Heng
    Qiu, Dongyu
    2006 IEEE 64TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-6, 2006, : 2078 - +
  • [37] Security in wireless mobile Ad Hoc and sensor networks
    Guizani, Mohsen
    Du, Xiaojiang
    Chen, Hsiao-Hwa
    Mueller, Peter
    IEEE WIRELESS COMMUNICATIONS, 2007, 14 (05) : 6 - 7
  • [38] Channel Modeling for ad hoc mobile wireless networks
    Wang, R
    Cox, D
    IEEE 55TH VEHICULAR TECHNOLOGY CONFERENCE, VTC SPRING 2002, VOLS 1-4, PROCEEDINGS, 2002, : 21 - 25
  • [39] DEVS modeling of mobile wireless ad hoc networks
    Farooq, Urnar
    Wainer, Gabriel
    Balya, Bengu
    SIMULATION MODELLING PRACTICE AND THEORY, 2007, 15 (03) : 285 - 314
  • [40] Anonymous routing for mobile wireless ad hoc networks
    Durresi, Arjan
    Paruchuri, Vamsi
    Durres, Mimoza
    Barolli, Leonard
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2007, 3 (01): : 105 - 117