TEAP: trust-enhanced anonymous on-demand routing protocol for mobile ad hoc networks

被引:17
作者
Gunasekaran, Muthumanickam [1 ]
Premalatha, Kandhasamy [2 ]
机构
[1] Bannari Amman Inst Technol, Dept Comp Applicat, Sathyamangalam, Tamil Nadu, India
[2] Bannari Amman Inst Technol, Dept Comp Sci & Engn, Sathyamangalam, Tamil Nadu, India
关键词
cryptographic protocols; radio receivers; routing protocols; telecommunication security; mobile ad hoc networks; misbehaving user detection; cryptography concept; broadcast trapdoor information; cooperative message; MANET; security; mobile ad hoc network; trust-enhanced anonymous on-demand routing protocol; TEAP; SECURITY; PRIVACY;
D O I
10.1049/iet-ifs.2012.0141
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security plays a major role in implementing mobile ad hoc networks (MANET) for communication in an adverse environment. This study introduces the concept of anonymity for an informant who identifies and reports anonymously the misbehaviour of the users in the network. The trust-enhanced anonymous on-demand routing protocol (TEAP) is proposed to restrain the misuse of anonymity in two methods. In the first method, a user is revealed as a misbehaving user to other users, if it does not send any cooperative message, upon receiving two warnings. In the second method, if a user attempts to send multiple claims against a particular user for the same reason it will also be termed as a misbehaving user. The TEAP protocol is designed based upon broadcast with trapdoor information is a cryptography concept which is used to detect the misbehaving users anonymously in the network. The simulation results prove the necessity of anonymity in MANET and the effectiveness of this protocol in achieving such anonymity.
引用
收藏
页码:203 / 211
页数:9
相关论文
共 16 条
[1]   A Survey of Secure Mobile Ad Hoc Routing Protocols [J].
Abusalah, Loay ;
Khokhar, Ashfaq ;
Guizani, Mohsen .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2008, 10 (04) :78-93
[2]   ASR: anonymous and secure reporting of traffic forwarding activity in mobile ad hoc networks [J].
Choi, Heesook ;
Enck, William ;
Shin, Jaesheung ;
McDaniel, Patrick D. ;
La Porta, Thomas F. .
WIRELESS NETWORKS, 2009, 15 (04) :525-539
[3]  
Hu Junru, 2011, 2011 International Conference on Electronic & Mechanical Engineering and Information Technology (EMEIT 2011), P257, DOI 10.1109/EMEIT.2011.6022868
[4]   A survey of routing attacks in mobile Ad Hoc networks [J].
Kannhavong, Bounpadith ;
Nakayama, Hidehisa ;
Nemoto, Yoshiaki ;
Kato, Nei ;
Jamalipour, Abbas .
IEEE WIRELESS COMMUNICATIONS, 2007, 14 (05) :85-91
[5]  
Li W., 2010, COMPUTER INFORM SCI, P696
[6]  
Menezes A., 1996, HDB APPL CRYPTOGRAPH
[7]   Privacy within pervasive communications [J].
Nezhad, Alireza A. ;
Miri, Ali ;
Makrakis, Dimitris ;
Barbosa, Luis O. .
TELECOMMUNICATION SYSTEMS, 2009, 40 (3-4) :101-116
[8]   Establishing Trust Through Anonymous and Private Information Exchange Over Personal Networks [J].
Patrikakis, Charalampos Z. ;
Kyriazanos, Dimitris M. ;
Prasad, Neeli R. .
WIRELESS PERSONAL COMMUNICATIONS, 2009, 51 (01) :121-135
[9]   Anonymous connections and onion routing [J].
Reed, MG ;
Syverson, PF ;
Goldschlag, DM .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) :482-494
[10]   SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks [J].
Sun, Jinyuan ;
Zhang, Chi ;
Zhang, Yanchao ;
Fang, Yuguang .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (02) :295-307