Anonymous proactive routing for wireless infrastructure mesh networks

被引:0
作者
Nezhad, Alireza A. [1 ]
Miri, Ali [1 ]
Makrakis, Dimitris [1 ]
Barbosa, Luis Orozco [2 ]
机构
[1] Univ Ottawa, 800 King Edward Ave, Ottawa, ON, Canada
[2] Univ Castilla La Mancha, Inst Invest Informat, Ciudad Real 02071, Spain
来源
WIRELESS SENSOR AND ACTOR NETWORKS | 2007年
关键词
location privacy; anonymity; ad hoc routing; mesh networks;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
An overlay routing protocol for infrastructure mesh networks is proposed that preserves user location privacy, source anonymity, destination anonymity and communication anonymity against an omni-present eavesdropper, when the underlying routing protocol is based on a proactive approach. A client only trusts its immediate access router. In order to receive packets, a client establishes a secret hop-by-hop virtual circuit between an arbitrary router, called its Rendezvous Point (RP) and its own access router, ahead of time. Packets destined for that client would be sent to RP first. To thwart content analysis attacks, we have used per-hop encryption. Authenticity and confidentiality of exchanged messages are also ensured using a public key infrastructure (PKI).
引用
收藏
页码:71 / +
页数:2
相关论文
共 50 条
  • [41] Towards a Taxonomy of Wired and Wireless Anonymous Networks
    Kelly, Douglas
    Raines, Richard
    Baldwin, Rusty
    Mullins, Barry
    Grimaila, Michael
    2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 585 - 592
  • [42] ASMesh: Anonymous and Secure Messaging in Mesh Networks Using Stronger, Anonymous Double Ratchet
    Bienstock, Alexander
    Roesler, Paul
    Tang, Yi
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 1 - 15
  • [43] Routing and packet scheduling in WiMAX mesh networks
    Jin, Fanchun
    Arora, Amrinder
    Hwang, Jinho
    Choi, Hyeong-Ah
    2007 FOURTH INTERNATIONAL CONFERENCE ON BROADBAND COMMUNICATIONS, NETWORKS & SYSTEMS, VOLS 1 AND 2, 2007, : 574 - 582
  • [44] Routing TCP Flows in Underwater Mesh Networks
    Huang, Chin-Ya
    Ramanathan, Parameswaran
    Saluja, Kewal
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2011, 29 (10) : 2022 - 2032
  • [45] Study of ZigBee Wireless Mesh Networks
    Sun, Jing
    Zhang, Xiaofen
    HIS 2009: 2009 NINTH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS, VOL 2, PROCEEDINGS, 2009, : 264 - 267
  • [46] Encryption in Mobile Wireless Mesh Networks
    Witzke, Edward L.
    Brenkosh, Joseph P.
    Green, Karl L.
    Riblett, Loren E.
    Wiseman, James M.
    46TH ANNUAL 2012 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, 2012, : 251 - 256
  • [47] Improved network resilience of wireless mesh networks using MPLS and Fast Re-Routing techniques
    Bisti, L.
    Lenzini, L.
    Mingozzi, E.
    Vallati, C.
    Erta, A.
    Malesci, U.
    AD HOC NETWORKS, 2011, 9 (08) : 1448 - 1460
  • [48] ARM: Anonymous routing protocol for mobile ad hoc networks
    Department of Electrical Engineering , Faculty of Engineering, Katholieke Universiteit Leuven, Leuven, Belgium
    Int. J. Wireless Mobile Comput., 2009, 3 (145-155): : 145 - 155
  • [49] Anonymous Routing Protocols for Mobile Ad-Hoc Networks
    Lu, Tianbo
    Chen, Hao
    Zhao, Lingling
    Li, Yang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (04): : 229 - 239
  • [50] Location privacy and anonymity preserving routing for wireless sensor networks
    Nezhad, Alireza A.
    Miri, Ali
    Makrakis, Dimitris
    COMPUTER NETWORKS, 2008, 52 (18) : 3433 - 3452