PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks

被引:21
|
作者
Li, Teng [1 ]
Ma, Jianfeng [1 ]
Sun, Cong [1 ]
Wei, Dawei [1 ]
Xi, Ning [1 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian, Shaanxi, Peoples R China
来源
2017 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS (NANA) | 2017年
基金
中国国家自然科学基金;
关键词
MANETs; Verification; Privacy; Diagnostics;
D O I
10.1109/NaNA.2017.21
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Routing security has a great importance to the security of Mobile Ad Hoc Networks (MANETs). There are various kinds of attacks when establishing routing path between source and destination. The adversaries attempt to deceive the source node and get the privilege of data transmission. Then they try to launch the malicious behaviors such as passive or active attacks. Due to the characteristics of the MANETs, e.g. dynamic topology, open medium, distributed cooperation, and constrained capability, it is difficult to verify the behavior of nodes and detect malicious nodes without revealing any privacy. In this paper, we present PVad, an approach conducting privacy-preserving verification in the routing discovery phase of MANETs. PVad tries to find the existing communication rules by association rules instead of making the rules. PVad consists of two phases, a reasoning phase deducing the expected log data of the peers, and a verification phase using Merkle Hash Tree to verify the correctness of derived information without revealing any privacy of nodes on expected routing paths. Without deploying any special nodes to assist the verification, PVad can detect multiple malicious nodes by itself. To show our approach can be used to guarantee the security of the MANETs, we conduct our experiments in NS3 as well as the real router environment, and we improved the detection accuracy by 4% on average compared to our former work.
引用
收藏
页码:5 / 10
页数:6
相关论文
共 50 条
  • [1] PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks
    Li, Teng
    Ma, Jian-Feng
    Sun, Cong
    Xi, Ning
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2018, 34 (04) : 943 - 960
  • [2] Secure Compression of Privacy-Preserving Witnesses in Vehicular Ad Hoc Networks
    Qin, Bo
    Wu, Qianhong
    Zhang, Lei
    Domingo-Ferrer, Josep
    2010 IEEE 6TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2010, : 541 - 547
  • [3] A secure privacy-preserving hierarchical location service for mobile ad hoc networks
    Ruan, Xinghua
    Yu, Boyang
    Xu, Jingdong
    Yang, Lin
    MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2007, 4864 : 760 - +
  • [4] SPAWN: a secure privacy-preserving architecture in wireless mobile ad hoc networks
    Muthumanickam Gunasekaran
    Kandhasamy Premalatha
    EURASIP Journal on Wireless Communications and Networking, 2013
  • [5] A secure and privacy-preserving event reporting scheme for vehicular Ad Hoc networks
    Rabieh, Khaled
    Mahmoud, Mohamed M. E. A.
    Azer, Marianne
    Allam, Mahmoud
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3271 - 3281
  • [6] SPAWN: a secure privacy-preserving architecture in wireless mobile ad hoc networks
    Gunasekaran, Muthumanickam
    Premalatha, Kandhasamy
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2013,
  • [7] Privacy-preserving SVANETs Privacy-preserving Simple Vehicular Ad-hoc Networks
    Hajny, Jan
    Malina, Lukas
    Martinasek, Zdenek
    Zeman, Vaclav
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 267 - 274
  • [8] Privacy-Preserving Scheme for Mobile Ad Hoc Networks
    Michalas, Antonis
    Oleshchuk, Vladimir A.
    Komninos, Nikos
    Prasad, Neeli R.
    2011 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2011,
  • [9] Secure authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs)
    Manivannan, D.
    Moni, Shafika Showkat
    Zeadally, Sherali
    VEHICULAR COMMUNICATIONS, 2020, 25
  • [10] Lightweight Privacy-Preserving and Secure Communication Protocol for Hybrid Ad Hoc Wireless Networks
    Mahmoud, Mohamed M. E. A.
    Taha, Sanaa
    Misic, Jelena
    Shen, Xuemin
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (08) : 2077 - 2090