Anonymous secure communication in wireless mobile ad-hoc networks

被引:0
|
作者
Rahman, Sk. Md. Mizanur [1 ]
Inomata, Atsuo [2 ]
Okamoto, Takeshi [1 ]
Mambo, Masahiro [1 ]
Okamoto, Eiji [1 ]
机构
[1] Univ Tsukuba, Grad Sch Syst & Informat Engn, Tsukuba, Ibaraki 305, Japan
[2] Japan Sci & Technol Agcy, Tokyo, Japan
来源
关键词
ad-hoc network; anonymity; routing; pairing-based cryptography; security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The main characteristic of a mobile ad-hoc network is its infrastructure-less, highly dynamic topology, which is subject to malicious traffic analysis. Malicious intermediate nodes in wireless mobile ad-hoc networks are a threat concerning security as well as anonymity of exchanged information. To protect anonymity and achieve security of nodes in mobile ad-hoc networks, an anonymous on-demand routing protocol, termed RIOMO, is proposed. For this purpose, pseudo iDs of the nodes are generated considering Pairing-based Cryptography. Nodes can generate their own pseudo IDs independently. As a result RIOMO reduces pseudo lDs maintenance costs. Only trust-worthy nodes are allowed to take part in routing to discover a route. To ensure trustiness each node has to make authentication to its neighbors through an anonymous authentication process. Thus RIOMO safely communicates between nodes without disclosing node identities; it also provides different desirable anonymous properties such as identity privacy, location privacy, route anonymity, and robustness against several attacks.
引用
收藏
页码:140 / +
页数:2
相关论文
共 50 条
  • [31] On communication security in wireless ad-hoc sensor networks
    Slijepcevic, S
    Potkonjak, M
    Tsiatsis, V
    Zimbeck, S
    Srivastava, MB
    [J]. WET ICE 2002: ELEVENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2002, : 139 - 144
  • [32] Secure data communication in mobile ad hoc networks
    Papadimitratos, P
    Haas, ZJ
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) : 343 - 356
  • [33] Secure multipath communication in mobile ad hoc networks
    Burmester, M
    Van Le, T
    [J]. ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS, 2004, : 405 - 409
  • [34] Construction method of secure tunnels in wireless Ad-Hoc Networks
    Yang, Zhigang
    Wang, Jiacheng
    Chen, Wenlong
    [J]. 2020 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI2020), 2021, 187 : 122 - 127
  • [35] Secure Prophet Address Allocation for Mobile Ad-hoc Networks
    Zhou, Hongbo
    [J]. 2008 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING, PROCEEDINGS, 2008, : 60 - 67
  • [36] Distributed Secure Routing Protocol for Mobile Ad-Hoc Networks
    Khalil, Issa
    Bataineh, Sameer
    Qubajah, Liana
    Khreishah, Abdallah
    [J]. 2013 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2013, : 106 - 110
  • [37] Secure and Efficient Routing Mechanism in Mobile Ad-Hoc Networks
    Ali, Masroor
    Ullah, Zahid
    Khan, Meharban
    Hafeez, Abdul
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (04) : 436 - 441
  • [38] Secure and scalable routing protocol for Mobile Ad-hoc Networks
    Kang, NH
    Park, I
    Kim, Y
    [J]. MOBILITY AWARE TECHNOLOGIES AND APPLICATIONS, PROCEEDINGS, 2005, 3744 : 334 - 343
  • [39] Secure anonymous routing in trust and clustered wireless ad hoc networks
    Chen, Sisheng
    Xu, Li
    Chen, Zhide
    [J]. 2007 SECOND INTERNATIONAL CONFERENCE IN COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1 AND 2, 2007, : 488 - 492
  • [40] Secure and anonymous source routing protocol for wireless ad hoc networks
    Chen, Sisheng
    Xu, Li
    [J]. INTERNATIONAL SYMPOSIUM ON ADVANCES IN COMPUTER AND SENSOR NETWORKS AND SYSTEMS, PROCEEDINGS: IN CELEBRATION OF 60TH BIRTHDAY OF PROF. S. SITHARAMA IYENGAR FOR HIS CONTRIBUTIONS TO THE SCIENCE OF COMPUTING, 2008, : 9 - 14