Anonymous secure communication in wireless mobile ad-hoc networks

被引:0
作者
Rahman, Sk. Md. Mizanur [1 ]
Inomata, Atsuo [2 ]
Okamoto, Takeshi [1 ]
Mambo, Masahiro [1 ]
Okamoto, Eiji [1 ]
机构
[1] Univ Tsukuba, Grad Sch Syst & Informat Engn, Tsukuba, Ibaraki 305, Japan
[2] Japan Sci & Technol Agcy, Tokyo, Japan
来源
UBIQUITOUS CONVERGENCE TECHNOLOGY | 2007年 / 4412卷
关键词
ad-hoc network; anonymity; routing; pairing-based cryptography; security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The main characteristic of a mobile ad-hoc network is its infrastructure-less, highly dynamic topology, which is subject to malicious traffic analysis. Malicious intermediate nodes in wireless mobile ad-hoc networks are a threat concerning security as well as anonymity of exchanged information. To protect anonymity and achieve security of nodes in mobile ad-hoc networks, an anonymous on-demand routing protocol, termed RIOMO, is proposed. For this purpose, pseudo iDs of the nodes are generated considering Pairing-based Cryptography. Nodes can generate their own pseudo IDs independently. As a result RIOMO reduces pseudo lDs maintenance costs. Only trust-worthy nodes are allowed to take part in routing to discover a route. To ensure trustiness each node has to make authentication to its neighbors through an anonymous authentication process. Thus RIOMO safely communicates between nodes without disclosing node identities; it also provides different desirable anonymous properties such as identity privacy, location privacy, route anonymity, and robustness against several attacks.
引用
收藏
页码:140 / +
页数:2
相关论文
共 12 条
[1]  
BERRETO PSL, 2002, 2442 LNCS, P354
[2]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[3]  
Boneh D., 2001, LNCS, P514, DOI [DOI 10.1007/3-540-45682-1_30, DOI 10.1007/3-540-45682-130]
[4]  
ELKHATIB K, 2003, INT C PAR PROC WORKS
[5]   NetCamo: Camouflaging network traffic for QoS-guaranteed mission critical applications [J].
Guan, Y ;
Fu, XW ;
Xuan, D ;
Shenoy, PU ;
Bettati, R ;
Zhao, W .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2001, 31 (04) :253-265
[6]  
Hu Y., 2003, P 22 ANN JOINT C IEE
[7]  
KONG J, 2003, 4 SCM INT S MOB AD H
[8]  
Levine B. N., 2002, Journal of Computer Security, V10, P213
[9]  
RAYMOND J, 2001, LNCS, V2009, P10
[10]  
REED MG, 1998, IEEE J SEL AREA COMM, V16