Anonymous Secure Communication in Wireless Mobile Ad-Hoc Networks
The main characteristic of a mobile ad-hoc network is its infrastructure-less, highly dynamic topology, which is subject to malicious traffic analysis. Malicious intermediate nodes in wireless mobile ad-hoc networks are a threat concerning security as well as anonymity of exchanged information. To protect anonymity and achieve security of nodes in mobile ad-hoc networks, an anonymous on-demand routing protocol, termed RIOMO, is proposed. For this purpose, pseudo IDs of the nodes are generated considering Pairing-based Cryptography. Nodes can generate their own pseudo IDs independently. As a result RIOMO reduces pseudo IDs maintenance costs. Only trust-worthy nodes are allowed to take part in routing to discover a route. To ensure trustiness each node has to make authentication to its neighbors through an anonymous authentication process. Thus RIOMO safely communicates between nodes without disclosing node identities; it also provides different desirable anonymous properties such as identity privacy, location privacy, route anonymity, and robustness against several attacks.
KeywordsAd-hoc network Anonymity Routing Pairing-Based Cryptography Security
Unable to display preview. Download preview PDF.
- 2.ISO99 ISO IS 15408 (1999), available at http://www.commoncriteria.org
- 3.Zhang, Y., Liu, W., Lou, W.: Anonymous Communications in Mobile Ad Hoc Networks. In: IEEE Infocom 2005, March 13-17, 2005, The 24th Annual Conference Sponsored by IEEE Communications Society. IEEE Computer Society Press, Los Alamitos (2005), http://ece.wpi.edu/~wjlou/publication/INFOCOM05_Zhang.pdf Google Scholar
- 4.El-Khatib, K., et al.: Secure dynamic distributed routing algorithm for ad hoc wireless networks. In: International Conference on Parallel Processing Workshops (ICPPW’03) (2003)Google Scholar
- 6.Kong, J., Hong, X.: ANODR: ANonymous on demand routing with untraceable routes for mobile ad-hoc networks. In: Fourth ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc’03), pp. 291–302. ACM Press, New York (2003)Google Scholar
- 7.Levine, B.N., Shields, C.: Hordes: a multicast based protocol for anonymity. Journal of Computer Security 10(3), 213–240 (2002)Google Scholar
- 12.Hu, Y.C., Perrig, A., Johnson, D.B.: Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. In: Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003), IEEE Computer Society Press, Los Alamitos (2003)Google Scholar