Trust Enhanced Anonymous Routing in Mobile Ad-Hoc Networks

被引:3
作者
Shao, Min-Hua [1 ]
Huang, Shin-Jia [1 ]
机构
[1] Natl Pingtung Univ Sci & Technol, Dept Management Informat Syst, Nei Pu 91201, Pingtung, Taiwan
来源
PDCAT 2008: NINTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS | 2008年
关键词
D O I
10.1109/PDCAT.2008.10
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Anonymous routing is a value-added technique used in mobile ad hoc networks for the purposes of security and privacy concerns. It has inspired lot of research interest, but very few measures exist to trust-aware routing for anonymity protection. This paper proposes a reliable anonymous MANET routing protocol in the sense that the communicating parties are capable of choosing a secure end-to-end route free of any untrustworthy node during the anonymous route discovery process. The key features of our scheme are including of accomplishment of anonymity-related goals, trust-aware anonymous routing, effective pseudonym management and lightweight overhead it? computation, communication and storage.
引用
收藏
页码:335 / 341
页数:7
相关论文
共 13 条
[1]  
[Anonymous], 2005, SASN 05, P33
[2]  
[Anonymous], 2003, ACM INT S MOB AD HOC
[3]   Routing security in wireless ad hoc networks [J].
Deng, HM ;
Li, W ;
Agrawal, DP .
IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (10) :70-75
[4]   A SURVEY OF SECURITY ISSUES IN MOBILE AD HOC AND SENSOR NETWORKS [J].
Djenouri, Djamel ;
Khelladi, Lyes ;
Badache, Nadjib .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2005, 7 (04) :2-28
[5]   A SURVEY OF KEY MANAGEMENT IN AD HOC NETWORKS [J].
Hegland, Anne Marie ;
Winjum, Eli ;
Mjolsnes, Stig F. ;
Rong, Chunming ;
Kure, Oivind ;
Spilling, Pal .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2006, 8 (03) :48-66
[6]  
MO Y, 2007, 9 INT C ADV COMM TEC, V3, P2047
[7]   An efficient key predistribution scheme for ad hoc network security [J].
Ramkumar, M ;
Memon, N .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2005, 23 (03) :611-621
[8]   Securing ad hoe networks with "asymmetric" probabilistic key predistribution schemes [J].
Ramkumar, Mahalingam .
2006 IEEE Information Assurance Workshop, 2006, :290-296
[9]  
Seys S, 2006, 20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, PROCEEDINGS, P133
[10]  
SY D, 2006, IEEE INT C MOB ADH S, P267