PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks

被引:21
作者
Li, Teng [1 ]
Ma, Jianfeng [1 ]
Sun, Cong [1 ]
Wei, Dawei [1 ]
Xi, Ning [1 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian, Shaanxi, Peoples R China
来源
2017 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS (NANA) | 2017年
基金
中国国家自然科学基金;
关键词
MANETs; Verification; Privacy; Diagnostics;
D O I
10.1109/NaNA.2017.21
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Routing security has a great importance to the security of Mobile Ad Hoc Networks (MANETs). There are various kinds of attacks when establishing routing path between source and destination. The adversaries attempt to deceive the source node and get the privilege of data transmission. Then they try to launch the malicious behaviors such as passive or active attacks. Due to the characteristics of the MANETs, e.g. dynamic topology, open medium, distributed cooperation, and constrained capability, it is difficult to verify the behavior of nodes and detect malicious nodes without revealing any privacy. In this paper, we present PVad, an approach conducting privacy-preserving verification in the routing discovery phase of MANETs. PVad tries to find the existing communication rules by association rules instead of making the rules. PVad consists of two phases, a reasoning phase deducing the expected log data of the peers, and a verification phase using Merkle Hash Tree to verify the correctness of derived information without revealing any privacy of nodes on expected routing paths. Without deploying any special nodes to assist the verification, PVad can detect multiple malicious nodes by itself. To show our approach can be used to guarantee the security of the MANETs, we conduct our experiments in NS3 as well as the real router environment, and we improved the detection accuracy by 4% on average compared to our former work.
引用
收藏
页码:5 / 10
页数:6
相关论文
共 50 条
[41]   Privacy-Preserving Verification and Root-Cause Tracing towards UAV Social Networks [J].
Li, Teng ;
Ma, Jianfeng ;
Pei, Qingqi ;
Ma, Chengyan ;
Wei, Dawei ;
Sun, Cong .
ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
[42]   On the security of privacy-preserving authentication scheme with full aggregation in vehicular ad hoc network [J].
Kamil, Ismaila A. ;
Ogundoyin, Sunday O. .
SECURITY AND PRIVACY, 2020, 3 (03)
[43]   An Efficient Conditional Privacy-Preserving Authentication Scheme for the Prevention of Side-Channel Attacks in Vehicular Ad Hoc Networks [J].
Alshudukhi, Jalawi Sulaiman ;
Mohammed, Badiea Abdulkarem ;
Al-Mekhlafi, Zeyad Ghaleb .
IEEE ACCESS, 2020, 8 :226624-226636
[44]   DBCPA: Dual Blockchain-Assisted Conditional Privacy-Preserving Authentication Framework and Protocol for Vehicular Ad Hoc Networks [J].
Zhang, Jing ;
Jiang, Yue ;
Cui, Jie ;
He, Debiao ;
Bolodurina, Irina ;
Zhong, Hong .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (02) :1127-1141
[45]   Secure and privacy-preserving, timed vehicular communications [J].
Burmester, Mike ;
Magkos, Emmanouil ;
Chrissikopoulos, Vassilis .
INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2012, 10 (04) :219-229
[46]   SPCEX: Secure and Privacy-Preserving Cryptocurrency Exchange [J].
Xie, Haomeng ;
Yan, Zheng .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (05) :4404-4417
[47]   On the Road to Secure and Privacy-Preserving IoT Ecosystems [J].
Hernandez-Serrano, Juan ;
Munoz, Jose L. ;
Broering, Arne ;
Esparza, Oscar ;
Mikkelsen, Lars ;
Schwarzott, Wolfgang ;
Leon, Olga ;
Zibuschka, Jan .
INTEROPERABILITY AND OPEN-SOURCE SOLUTIONS FOR THE INTERNET OF THINGS (INTEROSS-IOT 2016), 2017, 10218 :107-122
[48]   Secure and Privacy-preserving Traffic Monitoring in VANETs [J].
Roy, Ayan ;
Madria, Sanjay .
2020 IEEE 17TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SMART SYSTEMS (MASS 2020), 2020, :567-575
[49]   PRIVACY-PRESERVING SPEAKER VERIFICATION AS PASSWORD MATCHING [J].
Pathak, Manas A. ;
Raj, Bhiksha .
2012 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2012, :1849-1852
[50]   A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks [J].
Odelu, Vanga ;
Zeadally, Sherali ;
Das, Ashok Kumar ;
Wazid, Mohammad ;
He, Debiao .
TELECOMMUNICATION SYSTEMS, 2018, 69 (04) :431-445