Anonymous secure communication in wireless mobile ad-hoc networks

被引:0
|
作者
Rahman, Sk. Md. Mizanur [1 ]
Inomata, Atsuo [2 ]
Okamoto, Takeshi [1 ]
Mambo, Masahiro [1 ]
Okamoto, Eiji [1 ]
机构
[1] Univ Tsukuba, Grad Sch Syst & Informat Engn, Tsukuba, Ibaraki 305, Japan
[2] Japan Sci & Technol Agcy, Tokyo, Japan
来源
关键词
ad-hoc network; anonymity; routing; pairing-based cryptography; security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The main characteristic of a mobile ad-hoc network is its infrastructure-less, highly dynamic topology, which is subject to malicious traffic analysis. Malicious intermediate nodes in wireless mobile ad-hoc networks are a threat concerning security as well as anonymity of exchanged information. To protect anonymity and achieve security of nodes in mobile ad-hoc networks, an anonymous on-demand routing protocol, termed RIOMO, is proposed. For this purpose, pseudo iDs of the nodes are generated considering Pairing-based Cryptography. Nodes can generate their own pseudo IDs independently. As a result RIOMO reduces pseudo lDs maintenance costs. Only trust-worthy nodes are allowed to take part in routing to discover a route. To ensure trustiness each node has to make authentication to its neighbors through an anonymous authentication process. Thus RIOMO safely communicates between nodes without disclosing node identities; it also provides different desirable anonymous properties such as identity privacy, location privacy, route anonymity, and robustness against several attacks.
引用
收藏
页码:140 / +
页数:2
相关论文
共 50 条
  • [21] A hierarchical anonymous routing scheme for mobile ad-hoc networks
    Liu, Jun
    Hong, Xiaoyan
    Kong, Jiejun
    Zheng, Qunwei
    Hu, Ning
    Bradford, Phillip G.
    [J]. MILCOM 2006, VOLS 1-7, 2006, : 3523 - +
  • [22] An anonymous distributed routing protocol in mobile ad-hoc networks
    Ren-Junn Hwang
    Yu-Kai Hsiao
    [J]. The Journal of Supercomputing, 2013, 66 : 888 - 906
  • [23] Trust Enhanced Anonymous Routing in Mobile Ad-Hoc Networks
    Shao, Min-Hua
    Huang, Shin-Jia
    [J]. PDCAT 2008: NINTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2008, : 335 - 341
  • [24] An anonymous distributed routing protocol in mobile ad-hoc networks
    Hwang, Ren-Junn
    Hsiao, Yu-Kai
    [J]. JOURNAL OF SUPERCOMPUTING, 2013, 66 (02): : 888 - 906
  • [25] Secure Distributed Anonymous Data Collection for Vehicular Ad-Hoc Networks
    Stegall, Jabari
    Wyglinski, Alexander
    [J]. 2018 IEEE 88TH VEHICULAR TECHNOLOGY CONFERENCE (VTC-FALL), 2018,
  • [26] On measuring anonymity for wireless mobile ad-hoc networks
    Huang, Dijiang
    [J]. 31ST IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2006, : 779 - 786
  • [27] Migration of mobile agents in ad-hoc, wireless networks
    Migas, N
    Buchanan, WJ
    McArtney, K
    [J]. 11TH IEEE INTERNATIONAL CONFERENCE AND WORKSHOP ON THE ENGINEERING OF COMPUTER-BASED SYSTEMS, PROCEEDINGS, 2004, : 530 - 535
  • [28] Designing secure wireless mobile ad hoc networks
    Balakrishnan, V
    Varadharajan, V
    [J]. AINA 2005: 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, 2005, : 5 - 8
  • [29] Special Issue on "Mobile Ad-Hoc Wireless Networks"
    Saadawi, Tarek Nazir
    Mouftah, Hussein
    [J]. JOURNAL OF ADVANCED RESEARCH, 2011, 2 (03) : 195 - 198
  • [30] Routing protocol for mobile ad-hoc wireless networks
    Nogales, Ivris Marcelo Bacarreza
    [J]. RADIOENGINEERING, 2007, 16 (03) : 86 - 90