Anonymity enabling scheme for wireless ad hoc networks

被引:0
作者
Boukerche, A [1 ]
El-Khatib, K [1 ]
Xu, L [1 ]
Korba, L [1 ]
机构
[1] Univ Ottawa, PARADISE Res Lab, SITE, Ottawa, ON K1N 6N5, Canada
来源
GLOBECOM 2004: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE WORKSHOPS | 2004年
关键词
routing; ad hoc; security; network simulator ns-2; wireless networks;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the advances of wireless and mobile telecommunications, anonymity is becoming one, the pressing issues for the design of future wireless ad hoc networks. In a wireless ad hoc network, communicating nodes usually seek the help of other intermediate nodes to establish communication channels. In such an environment, malicious intermediate nodes can be a threat to the security and/or anonymity of the exchanged data between the mobile nodes. While data encryption can protect the content exchanged between nodes, routing information may reveal valuable information about end users and their relationships. This paper proposes an anonymous routing protocol, similar to. onion routing used in wired networks. Our protocol includes also a mechanism to establish trust and avoid untrustworthy nodes during the route discovery process. The major objective of our protocol is to allow trustworthy intermediate nodes to participate in the routing protocol without jeopardizing the anonymity of the communicating nodes.
引用
收藏
页码:136 / 140
页数:5
相关论文
共 12 条
[1]  
[Anonymous], 1981, COMMUNICATIONS ACM
[2]  
BOUKERCHE A, TR2004 U OTT
[3]  
Chaum D., 1988, Journal of Cryptology, V1, P65, DOI 10.1007/BF00206326
[4]  
GOLDBERG I, 1999, FREEDOM NETWORK 1 0
[5]  
Johnson D.B., 2001, Ad Hoc Networking
[6]  
KORBA L, MATA 2002, P171
[7]  
Lundberg J., ROUTING SECURITY AD
[8]  
Papadimitratos P., 2002, SCS COMM NETW DISTR
[9]  
REED M, 1995, 12 ANN COMP SEC APPL, P95
[10]  
Reiter M., 1998, ACM T INFORM SYST, V1, P66, DOI DOI 10.1145/290163.290168