Anonymous authentication and secure communication protocol for wireless mobile ad hoc networks

The main characteristic of a mobile ad hoc network (MANET) is its infrastructure‐less, highly dynamic topology, which is subject to malicious traffic analysis. Malicious intermediate nodes in MANETs are a threat concerning security as well as anonymity of exchanged information. In this paper, we pro...

Full description

Saved in:
Bibliographic Details
Published inSecurity and communication networks Vol. 1; no. 2; pp. 179 - 189
Main Authors Mizanur Rahman, Sk. Md, Nasser, Nidal, Inomata, Atsuo, Okamoto, Takeshi, Mambo, Masahiro, Okamoto, Eiji
Format Journal Article
LanguageEnglish
Published Chichester, UK John Wiley & Sons, Ltd 01.03.2008
Subjects
Online AccessGet full text
ISSN1939-0114
1939-0122
DOI10.1002/sec.4

Cover

More Information
Summary:The main characteristic of a mobile ad hoc network (MANET) is its infrastructure‐less, highly dynamic topology, which is subject to malicious traffic analysis. Malicious intermediate nodes in MANETs are a threat concerning security as well as anonymity of exchanged information. In this paper, we propose an anonymous on‐demand routing protocol, called RINOMO, to protect anonymity and achieve security of nodes in MANETs. After successful authentication of the legitimate nodes in the network they can use their pseudo IDs for secure communication. Pseudo IDs of the nodes are generated considering pairing‐based cryptography. Nodes can generate their pseudo IDs independently and dynamically without consulting with system administrator. As a result, RINOMO reduces pseudo IDs maintenance costs. Only trust‐worthy nodes are allowed to take part in routing to discover a route. To ensure trustiness each node has to make authentication to its neighbors through the designed anonymous authentication process. Thus, RINOMO safely communicates between nodes without disclosing node identities. It also provides different desirable anonymous properties such as identity privacy, location privacy, route anonymity, and robustness against several attacks. Mathematical analysis of privacy loss is also evaluated and it shows there is no loss of privacy with respect to time. Thus, RINOMO is an anonymous robust protocol in MANETs. Copyright © 2008 John Wiley & Sons, Ltd.
Bibliography:istex:9F6368A33E27B4B20DFA3227588BC1A63210EAC1
ark:/67375/WNG-LGSBSTQB-S
ArticleID:SEC4
ISSN:1939-0114
1939-0122
DOI:10.1002/sec.4