Anonymous secure communication in wireless mobile ad-hoc networks

被引:0
|
作者
Rahman, Sk. Md. Mizanur [1 ]
Inomata, Atsuo [2 ]
Okamoto, Takeshi [1 ]
Mambo, Masahiro [1 ]
Okamoto, Eiji [1 ]
机构
[1] Univ Tsukuba, Grad Sch Syst & Informat Engn, Tsukuba, Ibaraki 305, Japan
[2] Japan Sci & Technol Agcy, Tokyo, Japan
来源
关键词
ad-hoc network; anonymity; routing; pairing-based cryptography; security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The main characteristic of a mobile ad-hoc network is its infrastructure-less, highly dynamic topology, which is subject to malicious traffic analysis. Malicious intermediate nodes in wireless mobile ad-hoc networks are a threat concerning security as well as anonymity of exchanged information. To protect anonymity and achieve security of nodes in mobile ad-hoc networks, an anonymous on-demand routing protocol, termed RIOMO, is proposed. For this purpose, pseudo iDs of the nodes are generated considering Pairing-based Cryptography. Nodes can generate their own pseudo IDs independently. As a result RIOMO reduces pseudo lDs maintenance costs. Only trust-worthy nodes are allowed to take part in routing to discover a route. To ensure trustiness each node has to make authentication to its neighbors through an anonymous authentication process. Thus RIOMO safely communicates between nodes without disclosing node identities; it also provides different desirable anonymous properties such as identity privacy, location privacy, route anonymity, and robustness against several attacks.
引用
收藏
页码:140 / +
页数:2
相关论文
共 50 条
  • [1] Secure and anonymous mobile ad-hoc networks
    Mu, Y
    Zhang, FG
    Susilo, W
    [J]. 2005 13TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS JOINTLY HELD WITH THE 2005 7TH IEEE MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS 1 AND 2, 2005, : 1132 - 1136
  • [2] Anonymous secure routing in mobile ad-hoc networks
    Zhu, B
    Wan, ZG
    Kankanhalli, MS
    Bao, F
    Deng, RH
    [J]. LCN 2004: 29TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2004, : 102 - 108
  • [3] Anonymous authentication and secure communication protocol for wireless mobile ad hoc networks
    Rahman, Sk Md Mizanur
    Nasser, Nidal
    Inomata, Atsuo
    Okamoto, Takeshi
    Mambo, Masahiro
    Okamoto, Eiji
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2008, 1 (02) : 179 - 189
  • [4] Secure routing protocols for mobile ad-hoc wireless networks
    Pirzada, AA
    McDonald, C
    [J]. ADVANCED WIRED AND WIRELESS NETWORKS, 2005, 26 : 57 - 80
  • [5] A secure communication protocol for ad-hoc wireless sensor networks
    Pearce, C
    Ma, VYM
    Bertok, P
    [J]. PROCEEDINGS OF THE 2004 INTELLIGENT SENSORS, SENSOR NETWORKS & INFORMATION PROCESSING CONFERENCE, 2004, : 79 - 84
  • [6] Secure Multimedia Communication over Mobile Ad-hoc Networks
    Sarma, Hiren Kumar Deva
    [J]. 2018 FIFTH INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (IEEE PDGC), 2018, : 812 - 817
  • [7] Whisper - A lightweight anonymous communication mechanism in wireless ad-hoc networks
    Cai, JF
    You, HY
    Lu, B
    Pooch, U
    Lu, M
    [J]. ICWN '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS, 2005, : 482 - 488
  • [8] Ad-hoc, mobile, and wireless networks
    Palattella, Maria Rita
    Scanzio, Stefano
    [J]. INTERNET TECHNOLOGY LETTERS, 2021, 4 (04)
  • [9] An Approach to Secure Communication in Mobile Ad-Hoc Networks of Android Devices
    Alam, Tanweer
    Aljohani, Mohammed
    [J]. 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATICS AND BIOMEDICAL SCIENCES (ICIIBMS), 2015, : 371 - 375
  • [10] Anonymous Routing Protocols for Mobile Ad-Hoc Networks
    Lu, Tianbo
    Chen, Hao
    Zhao, Lingling
    Li, Yang
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (04): : 229 - 239