E.: Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks. Rahman, S. M. M., Inomata, A., Okamoto, T., & Mambo, M. 2006.
E.: Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks [link]Paper  doi  abstract   bibtex   
The main characteristic of a mobile ad-hoc network is its infrastructure-less, highly dynamic topology, which is subject to malicious traffic analysis. Malicious intermediate nodes in wireless mobile ad-hoc networks are a threat concerning security as well as anonymity of exchanged information. To protect anonymity and achieve security of nodes in mobile ad-hoc networks, an anonymous on-demand routing protocol, termed RIOMO, is proposed. For this purpose, pseudo IDs of the nodes are generated considering Pairing-based Cryptography. Nodes can generate their own pseudo IDs independently. As a result RIOMO reduces pseudo IDs maintenance costs. Only trust-worthy nodes are allowed to take part in routing to discover a route. To ensure trustiness each node has to make authentication to its neighbors through an anonymous authentication process. Thus RIOMO safely communicates between nodes without disclosing node identities; it also provides different desirable anonymous properties such as identity privacy, location privacy, route anonymity, and robustness against several attacks.
@conference {Md06e.:anonymous,
	title = {E.: Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks},
	booktitle = {In: Proceedings of the First International Conference on Ubiquitous Convergence Technology},
	year = {2006},
	pages = {131{\textendash}140},
	publisher = {Springer},
	organization = {Springer},
	abstract = {The main characteristic of a mobile ad-hoc network is its infrastructure-less, highly dynamic topology, which is subject to malicious traffic analysis. Malicious intermediate nodes in wireless mobile ad-hoc networks are a threat concerning security as well as anonymity of exchanged information. To protect anonymity and achieve security of nodes in mobile ad-hoc networks, an anonymous on-demand routing protocol, termed RIOMO, is proposed. For this purpose, pseudo IDs of the nodes are generated considering Pairing-based Cryptography. Nodes can generate their own pseudo IDs independently. As a result RIOMO reduces pseudo IDs maintenance costs. Only trust-worthy nodes are allowed to take part in routing to discover a route. To ensure trustiness each node has to make authentication to its neighbors through an anonymous authentication process. Thus RIOMO safely communicates between nodes without disclosing node identities; it also provides different desirable anonymous properties such as identity privacy, location privacy, route anonymity, and robustness against several attacks.},
	keywords = {ad-hoc networks, anonymity, routing},
	doi = {10.1007/978-3-540-71789-8},
	url = {http://www.springerlink.com/content/g6334148068w1254/},
	author = {Sk. Md. Mizanur Rahman and Atsuo Inomata and Takeshi Okamoto and Masahiro Mambo}
}

Downloads: 0