PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks

被引:21
作者
Li, Teng [1 ]
Ma, Jianfeng [1 ]
Sun, Cong [1 ]
Wei, Dawei [1 ]
Xi, Ning [1 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian, Shaanxi, Peoples R China
来源
2017 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS (NANA) | 2017年
基金
中国国家自然科学基金;
关键词
MANETs; Verification; Privacy; Diagnostics;
D O I
10.1109/NaNA.2017.21
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Routing security has a great importance to the security of Mobile Ad Hoc Networks (MANETs). There are various kinds of attacks when establishing routing path between source and destination. The adversaries attempt to deceive the source node and get the privilege of data transmission. Then they try to launch the malicious behaviors such as passive or active attacks. Due to the characteristics of the MANETs, e.g. dynamic topology, open medium, distributed cooperation, and constrained capability, it is difficult to verify the behavior of nodes and detect malicious nodes without revealing any privacy. In this paper, we present PVad, an approach conducting privacy-preserving verification in the routing discovery phase of MANETs. PVad tries to find the existing communication rules by association rules instead of making the rules. PVad consists of two phases, a reasoning phase deducing the expected log data of the peers, and a verification phase using Merkle Hash Tree to verify the correctness of derived information without revealing any privacy of nodes on expected routing paths. Without deploying any special nodes to assist the verification, PVad can detect multiple malicious nodes by itself. To show our approach can be used to guarantee the security of the MANETs, we conduct our experiments in NS3 as well as the real router environment, and we improved the detection accuracy by 4% on average compared to our former work.
引用
收藏
页码:5 / 10
页数:6
相关论文
共 50 条
[31]   Secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks [J].
Li, Chun-Ta ;
Hwang, Min-Shiang ;
Chu, Yen-Ping .
COMPUTER COMMUNICATIONS, 2008, 31 (12) :2803-2814
[32]   A Secure Source Routing Protocol for Mobile Ad Hoc Networks [J].
Mahmood, Baban A. ;
Manivannan, D. .
INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2020, 11 (03) :212-234
[33]   A Secure Optimization Routing Algorithm for Mobile Ad Hoc Networks [J].
Srilakshmi, Uppalapati ;
Alghamdi, Saleh Ahmed ;
Vuyyuru, Veera Ankalu ;
Veeraiah, Neenavath ;
Alotaibi, Youseef .
IEEE ACCESS, 2022, 10 :14260-14269
[34]   Survey of Secure Routing Protocols for Wireless Ad Hoc Networks [J].
Boulaiche, Mehdi .
WIRELESS PERSONAL COMMUNICATIONS, 2020, 114 (01) :483-517
[35]   An autonomous lightweight conditional privacy-preserving authentication scheme with provable security for vehicular ad-hoc networks [J].
Ogundoyin S.O. .
International Journal of Computers and Applications, 2020, 42 (02) :196-211
[36]   CPCROK: A Communication-Efficient and Privacy-Preserving Scheme for Low-Density Vehicular Ad Hoc Networks [J].
Wang, Junchao ;
Li, Honglin ;
Sun, Yan ;
Phillips, Chris ;
Mylonas, Alexios ;
Gritzalis, Dimitris .
FUTURE INTERNET, 2025, 17 (04)
[37]   An Analysis of Query Forwarding Strategies for Secure and Privacy-Preserving Social Networks [J].
Duerr, Michael ;
Maier, Marco ;
Wiesner, Kevin .
2012 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM), 2012, :535-542
[38]   EGPS: An Efficient Privacy Preserving Scheme for Vehicular ad hoc Networks [J].
Zhao, Baokang ;
Su, Xiangyu ;
Su, Jinshu ;
Song, Ziming ;
Sun, Yipin ;
Tao, Jing ;
Tang, Yong ;
Chen, Shuhui ;
Zhao, Guohong ;
Chen, Yijiao .
NUMERICAL ANALYSIS AND APPLIED MATHEMATICS, VOLS I-III, 2010, 1281 :306-309
[39]   PPREM: Privacy Preserving REvocation Mechanism for Vehicular Ad Hoc Networks [J].
Ganan, Carlos ;
Munoz, Jose L. ;
Esparza, Oscar ;
Mata-Diaz, Jorge ;
Alins, Juanjo .
COMPUTER STANDARDS & INTERFACES, 2014, 36 (03) :513-523
[40]   PRIVO: A PRIvacy-preserVing Opportunistic routing protocol for Delay Tolerant Networks [J].
Magaia, Naercio ;
Borrego, Carlos ;
Pereira, Paulo ;
Correia, Miguel .
2017 IFIP NETWORKING CONFERENCE (IFIP NETWORKING) AND WORKSHOPS, 2017,