A Secure and Anonymous Routing Scheme Based on Ring Signature in MANETs

被引:0
作者
Xu, M. [1 ]
Qu, D. [1 ]
机构
[1] China Elect Technol Grp Corp, Res Inst 28, Nanjing 210007, Jiangsu, Peoples R China
来源
INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENVIRONMENTAL ENGINEERING (CSEE 2015) | 2015年
关键词
MANET; security; anonymity; trusted computing; ring signature;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Providing secure and anonymous communication is an important issue for mobile ad hoc network (MANET) routing protocols. For the purpose of security and anonymity, the Secure Anonymous Ad-hoc On-demand Distance Vector routing protocol (SAAODV) for secure and anonymous routing in MANETs based on ring signature is proposed. It uses trusted computing and ring signature to ensure security and anonymity. Besides, simulations are done in existence of different number of adversaries. The results show that the countermeasures in SAAODV are effective against attacks from independent and colluding adversaries and have only a small effect on packet deliver radio, meanwhile providing secure and anonymous communications and improved routing performance.
引用
收藏
页码:888 / 895
页数:8
相关论文
共 9 条
[1]  
Hu Y., 2002, WMCSA 02 P 4 IEEE WO, P3
[2]   Ariadne: A secure on-demand routing protocol for ad hoc networks [J].
Hu, YC ;
Perrig, A ;
Johnson, DB .
WIRELESS NETWORKS, 2005, 11 (1-2) :21-38
[3]  
Jarrett M, 2006, CNSR 2006: COMMUNICATION NETWORKS AND SERVICES RESEARCH CONFERENCE, PROCEEDINGS, P61
[4]  
Ji F, 2005, I C COMP SYST APPLIC
[5]  
Rivest R.L., 2001, P ASIACRYPT, V7, P552, DOI [DOI 10.1007/3-540-45682-1_32, 10.1007/3-540-45682-1]
[6]   A secure routing protocol for ad hoc networks [J].
Sanzgiri, K ;
Dahill, B ;
Levine, BN ;
Shields, C ;
Belding-Royer, EM .
10TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS, PROCEEDINGS, 2002, :78-87
[7]  
Sarela M., 2011, INFOCOM
[8]   Minimal Trusted Computing Base for MANET [J].
Thotakura, Vinay ;
Ramkumar, Mahalingam .
2010 IEEE 6TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2010, :91-99
[9]  
Wenchao Huang, 2009, 2009 International Conference on Computational Science and Engineering (CSE), P809, DOI 10.1109/CSE.2009.87