E.: Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks. Rahman, S. M. M., Inomata, A., Okamoto, T., & Mambo, M. 2006.
Paper doi abstract bibtex The main characteristic of a mobile ad-hoc network is its infrastructure-less, highly dynamic topology, which is subject to malicious traffic analysis. Malicious intermediate nodes in wireless mobile ad-hoc networks are a threat concerning security as well as anonymity of exchanged information. To protect anonymity and achieve security of nodes in mobile ad-hoc networks, an anonymous on-demand routing protocol, termed RIOMO, is proposed. For this purpose, pseudo IDs of the nodes are generated considering Pairing-based Cryptography. Nodes can generate their own pseudo IDs independently. As a result RIOMO reduces pseudo IDs maintenance costs. Only trust-worthy nodes are allowed to take part in routing to discover a route. To ensure trustiness each node has to make authentication to its neighbors through an anonymous authentication process. Thus RIOMO safely communicates between nodes without disclosing node identities; it also provides different desirable anonymous properties such as identity privacy, location privacy, route anonymity, and robustness against several attacks.
@conference {Md06e.:anonymous,
title = {E.: Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks},
booktitle = {In: Proceedings of the First International Conference on Ubiquitous Convergence Technology},
year = {2006},
pages = {131{\textendash}140},
publisher = {Springer},
organization = {Springer},
abstract = {The main characteristic of a mobile ad-hoc network is its infrastructure-less, highly dynamic topology, which is subject to malicious traffic analysis. Malicious intermediate nodes in wireless mobile ad-hoc networks are a threat concerning security as well as anonymity of exchanged information. To protect anonymity and achieve security of nodes in mobile ad-hoc networks, an anonymous on-demand routing protocol, termed RIOMO, is proposed. For this purpose, pseudo IDs of the nodes are generated considering Pairing-based Cryptography. Nodes can generate their own pseudo IDs independently. As a result RIOMO reduces pseudo IDs maintenance costs. Only trust-worthy nodes are allowed to take part in routing to discover a route. To ensure trustiness each node has to make authentication to its neighbors through an anonymous authentication process. Thus RIOMO safely communicates between nodes without disclosing node identities; it also provides different desirable anonymous properties such as identity privacy, location privacy, route anonymity, and robustness against several attacks.},
keywords = {ad-hoc networks, anonymity, routing},
doi = {10.1007/978-3-540-71789-8},
url = {http://www.springerlink.com/content/g6334148068w1254/},
author = {Sk. Md. Mizanur Rahman and Atsuo Inomata and Takeshi Okamoto and Masahiro Mambo}
}
Downloads: 0
{"_id":"n96hSXv4vhR32v646","bibbaseid":"rahman-inomata-okamoto-mambo-eanonymoussecurecommunicationinwirelessmobileadhocnetworks-2006","downloads":0,"creationDate":"2018-07-03T04:50:28.362Z","title":"E.: Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks","author_short":["Rahman, S. M. M.","Inomata, A.","Okamoto, T.","Mambo, M."],"year":2006,"bibtype":"conference","biburl":"https://gnunet.org/bibliography/export/bibtex","bibdata":{"bibtype":"conference","type":"conference","title":"E.: Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks","booktitle":"In: Proceedings of the First International Conference on Ubiquitous Convergence Technology","year":"2006","pages":"131\\textendash140","publisher":"Springer","organization":"Springer","abstract":"The main characteristic of a mobile ad-hoc network is its infrastructure-less, highly dynamic topology, which is subject to malicious traffic analysis. Malicious intermediate nodes in wireless mobile ad-hoc networks are a threat concerning security as well as anonymity of exchanged information. To protect anonymity and achieve security of nodes in mobile ad-hoc networks, an anonymous on-demand routing protocol, termed RIOMO, is proposed. For this purpose, pseudo IDs of the nodes are generated considering Pairing-based Cryptography. Nodes can generate their own pseudo IDs independently. As a result RIOMO reduces pseudo IDs maintenance costs. Only trust-worthy nodes are allowed to take part in routing to discover a route. To ensure trustiness each node has to make authentication to its neighbors through an anonymous authentication process. Thus RIOMO safely communicates between nodes without disclosing node identities; it also provides different desirable anonymous properties such as identity privacy, location privacy, route anonymity, and robustness against several attacks.","keywords":"ad-hoc networks, anonymity, routing","doi":"10.1007/978-3-540-71789-8","url":"http://www.springerlink.com/content/g6334148068w1254/","author":[{"firstnames":["Sk.","Md.","Mizanur"],"propositions":[],"lastnames":["Rahman"],"suffixes":[]},{"firstnames":["Atsuo"],"propositions":[],"lastnames":["Inomata"],"suffixes":[]},{"firstnames":["Takeshi"],"propositions":[],"lastnames":["Okamoto"],"suffixes":[]},{"firstnames":["Masahiro"],"propositions":[],"lastnames":["Mambo"],"suffixes":[]}],"bibtex":"@conference {Md06e.:anonymous,\n\ttitle = {E.: Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks},\n\tbooktitle = {In: Proceedings of the First International Conference on Ubiquitous Convergence Technology},\n\tyear = {2006},\n\tpages = {131{\\textendash}140},\n\tpublisher = {Springer},\n\torganization = {Springer},\n\tabstract = {The main characteristic of a mobile ad-hoc network is its infrastructure-less, highly dynamic topology, which is subject to malicious traffic analysis. Malicious intermediate nodes in wireless mobile ad-hoc networks are a threat concerning security as well as anonymity of exchanged information. To protect anonymity and achieve security of nodes in mobile ad-hoc networks, an anonymous on-demand routing protocol, termed RIOMO, is proposed. For this purpose, pseudo IDs of the nodes are generated considering Pairing-based Cryptography. Nodes can generate their own pseudo IDs independently. As a result RIOMO reduces pseudo IDs maintenance costs. Only trust-worthy nodes are allowed to take part in routing to discover a route. To ensure trustiness each node has to make authentication to its neighbors through an anonymous authentication process. Thus RIOMO safely communicates between nodes without disclosing node identities; it also provides different desirable anonymous properties such as identity privacy, location privacy, route anonymity, and robustness against several attacks.},\n\tkeywords = {ad-hoc networks, anonymity, routing},\n\tdoi = {10.1007/978-3-540-71789-8},\n\turl = {http://www.springerlink.com/content/g6334148068w1254/},\n\tauthor = {Sk. Md. Mizanur Rahman and Atsuo Inomata and Takeshi Okamoto and Masahiro Mambo}\n}\n","author_short":["Rahman, S. M. M.","Inomata, A.","Okamoto, T.","Mambo, M."],"key":"Md06e.:anonymous","id":"Md06e.:anonymous","bibbaseid":"rahman-inomata-okamoto-mambo-eanonymoussecurecommunicationinwirelessmobileadhocnetworks-2006","role":"author","urls":{"Paper":"http://www.springerlink.com/content/g6334148068w1254/"},"keyword":["ad-hoc networks","anonymity","routing"],"downloads":0},"search_terms":["anonymous","secure","communication","wireless","mobile","hoc","networks","rahman","inomata","okamoto","mambo"],"keywords":["ad-hoc networks","anonymity","routing"],"authorIDs":[],"dataSources":["FWsPTwsmjtrBtRS3B"]}