A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks

被引:35
作者
Li, Chun-Ta [2 ]
Hwang, Min-Shiang [1 ]
机构
[1] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 413, Taiwan
[2] Tainan Univ Technol, Dept Informat Management, Tainan 710, Taiwan
关键词
Anonymous routing; Mutual authentication; PKI solution; Information security; Wireless ad hoc networks; PASSWORD AUTHENTICATION; SECURE COMMUNICATIONS; MOBILE; SCHEME; EFFICIENT; ESTABLISHMENT; ENHANCEMENT; MANAGEMENT; EXCHANGE; CLUSTER;
D O I
10.1016/j.ins.2011.07.014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mote attention should be paid to anonymous routing protocols in secure wireless ad hoc networks. However, as far as we know, only a few papers on secure routing protocols have addressed both issues of anonymity and efficiency. Most recent protocols adopted public key Infrastructure (PKI) solutions to ensure the anonymity and security of route constructing mechanisms. Since PKI solution requires huge and expensive infrastructure with complex computations and the resource constraints of small ad hoc devices; a two-layer authentication protocol with anonymous routing (TAPAR) is proposed in this paper. TAPAR does not adopt public key computations to provide secure and anonymous communications between source and destination nodes over wireless ad hoc networks. Moreover, TAPAR accomplishes mutual authentication, session key agreement, and forward secrecy among communicating nodes; along with integration of non-PKI techniques into the routing protocol allowing the source node to anonymously interact with the destination node through a number of intermediate nodes. Without adopting PKI en/decryptions, our proposed TAPAR can be efficiently implemented on small ad hoc devices while at least reducing the computational overhead of participating nodes in TAPAR by 21.75%. Our protocol is certainly favorable when compared with other related protocols. (C) 2011 Elsevier Inc. All rights reserved.
引用
收藏
页码:5333 / 5347
页数:15
相关论文
共 58 条
[1]  
[Anonymous], INT C PAR PROC WORKS
[2]  
[Anonymous], 4 ACM INT S MOB AD H
[3]  
[Anonymous], P SCS COMM NETW DIST
[4]  
[Anonymous], P MOBICOM
[5]   Energy efficient all-to-all broadcast in all-wireless networks [J].
Bein, Doina ;
Zheng, S. Q. .
INFORMATION SCIENCES, 2010, 180 (10) :1781-1792
[6]   An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks [J].
Boukerche, A ;
El-Khatib, K ;
Xu, L ;
Korba, L .
COMPUTER COMMUNICATIONS, 2005, 28 (10) :1193-1203
[7]   Threshold password authentication against guessing attacks in Ad hoc networks [J].
Chai, Zhenchuan ;
Cao, Zhenfu ;
Lu, Rongxing .
AD HOC NETWORKS, 2007, 5 (07) :1046-1054
[8]   Hierarchical management protocol for constructing a QoS communication path in wireless Ad Hoc networks [J].
Chang, Chih-Yung ;
Chang, Chao-Tsun ;
Chen, Tzung-Shi ;
Chang, Hsu-Ruey .
INFORMATION SCIENCES, 2007, 177 (13) :2621-2641
[9]   Packet construction for secure conference call request in ad hoc network systems [J].
Chen, Hsing-Chung ;
Wang, Shiuh-Jeng ;
Wen, Jyh-Horng .
INFORMATION SCIENCES, 2007, 177 (24) :5598-5610
[10]  
Chlamtac Imrich., 2003, Ad Hoc Networks, V1, P13, DOI DOI 10.1016/S1570-8705(03)00013-1