Anonymous authentication and secure communication protocol for wireless mobile ad hoc networks
The main characteristic of a mobile ad hoc network (MANET) is its infrastructure‐less, highly dynamic topology, which is subject to malicious traffic analysis. Malicious intermediate nodes in MANETs are a threat concerning security as well as anonymity of exchanged information. In this paper, we pro...
Saved in:
| Published in | Security and communication networks Vol. 1; no. 2; pp. 179 - 189 |
|---|---|
| Main Authors | , , , , , |
| Format | Journal Article |
| Language | English |
| Published |
Chichester, UK
John Wiley & Sons, Ltd
01.03.2008
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 1939-0114 1939-0122 |
| DOI | 10.1002/sec.4 |
Cover
| Abstract | The main characteristic of a mobile ad hoc network (MANET) is its infrastructure‐less, highly dynamic topology, which is subject to malicious traffic analysis. Malicious intermediate nodes in MANETs are a threat concerning security as well as anonymity of exchanged information. In this paper, we propose an anonymous on‐demand routing protocol, called RINOMO, to protect anonymity and achieve security of nodes in MANETs. After successful authentication of the legitimate nodes in the network they can use their pseudo IDs for secure communication. Pseudo IDs of the nodes are generated considering pairing‐based cryptography. Nodes can generate their pseudo IDs independently and dynamically without consulting with system administrator. As a result, RINOMO reduces pseudo IDs maintenance costs. Only trust‐worthy nodes are allowed to take part in routing to discover a route. To ensure trustiness each node has to make authentication to its neighbors through the designed anonymous authentication process. Thus, RINOMO safely communicates between nodes without disclosing node identities. It also provides different desirable anonymous properties such as identity privacy, location privacy, route anonymity, and robustness against several attacks. Mathematical analysis of privacy loss is also evaluated and it shows there is no loss of privacy with respect to time. Thus, RINOMO is an anonymous robust protocol in MANETs. Copyright © 2008 John Wiley & Sons, Ltd. |
|---|---|
| AbstractList | The main characteristic of a mobile ad hoc network (MANET) is its infrastructure‐less, highly dynamic topology, which is subject to malicious traffic analysis. Malicious intermediate nodes in MANETs are a threat concerning security as well as anonymity of exchanged information. In this paper, we propose an anonymous on‐demand routing protocol, called RINOMO, to protect anonymity and achieve security of nodes in MANETs. After successful authentication of the legitimate nodes in the network they can use their pseudo IDs for secure communication. Pseudo IDs of the nodes are generated considering pairing‐based cryptography. Nodes can generate their pseudo IDs independently and dynamically without consulting with system administrator. As a result, RINOMO reduces pseudo IDs maintenance costs. Only trust‐worthy nodes are allowed to take part in routing to discover a route. To ensure trustiness each node has to make authentication to its neighbors through the designed anonymous authentication process. Thus, RINOMO safely communicates between nodes without disclosing node identities. It also provides different desirable anonymous properties such as identity privacy, location privacy, route anonymity, and robustness against several attacks. Mathematical analysis of privacy loss is also evaluated and it shows there is no loss of privacy with respect to time. Thus, RINOMO is an anonymous robust protocol in MANETs. Copyright © 2008 John Wiley & Sons, Ltd. The main characteristic of a mobile ad hoc network (MANET) is its infrastructure‐less, highly dynamic topology, which is subject to malicious traffic analysis. Malicious intermediate nodes in MANETs are a threat concerning security as well as anonymity of exchanged information. In this paper, we propose an anonymous on‐demand routing protocol, called RINOMO, to protect anonymity and achieve security of nodes in MANETs. After successful authentication of the legitimate nodes in the network they can use their pseudo IDs for secure communication. Pseudo IDs of the nodes are generated considering pairing‐based cryptography. Nodes can generate their pseudo IDs independently and dynamically without consulting with system administrator. As a result, RINOMO reduces pseudo IDs maintenance costs. Only trust‐worthy nodes are allowed to take part in routing to discover a route. To ensure trustiness each node has to make authentication to its neighbors through the designed anonymous authentication process. Thus, RINOMO safely communicates between nodes without disclosing node identities. It also provides different desirable anonymous properties such as identity privacy, location privacy, route anonymity, and robustness against several attacks. Mathematical analysis of privacy loss is also evaluated and it shows there is no loss of privacy with respect to time. Thus, RINOMO is an anonymous robust protocol in MANETs. Copyright © 2008 John Wiley & Sons, Ltd. |
| Author | Mizanur Rahman, Sk. Md Inomata, Atsuo Okamoto, Eiji Mambo, Masahiro Nasser, Nidal Okamoto, Takeshi |
| Author_xml | – sequence: 1 givenname: Sk. Md surname: Mizanur Rahman fullname: Mizanur Rahman, Sk. Md organization: Department of Computing and Information Science, University of Guelph, Guelph, Ontario N1G 2W1, Canada – sequence: 2 givenname: Nidal surname: Nasser fullname: Nasser, Nidal email: nasser@cis.uoguelph.ca organization: Department of Computing and Information Science, University of Guelph, Guelph, Ontario N1G 2W1, Canada – sequence: 3 givenname: Atsuo surname: Inomata fullname: Inomata, Atsuo organization: Japan Science and Technology Agency, Resona-Maruha Bldg, 18F, 1-1-2 Otemachi, Chiyoda-ku, Tokyo 100-0005, Japan – sequence: 4 givenname: Takeshi surname: Okamoto fullname: Okamoto, Takeshi organization: Graduate School of Systems and Information Engineering, University of Tsukuba, 1-1-1 Tennodai, Tsukuba, Ibaraki 305-8573, Japan – sequence: 5 givenname: Masahiro surname: Mambo fullname: Mambo, Masahiro organization: Graduate School of Systems and Information Engineering, University of Tsukuba, 1-1-1 Tennodai, Tsukuba, Ibaraki 305-8573, Japan – sequence: 6 givenname: Eiji surname: Okamoto fullname: Okamoto, Eiji organization: Graduate School of Systems and Information Engineering, University of Tsukuba, 1-1-1 Tennodai, Tsukuba, Ibaraki 305-8573, Japan |
| BookMark | eNpt0FFPwjAQAODGYCIg_6EvxgczvK4b2x6BIJoQjRnGN5uua0NlW0lbgvx7hygP6lOvue8ud9dDncY0EqEBgSEBCG-dFMPoDHVJRrMASBh2TjGJLlDPuXeAEYmSqIvexm3xvjZbh_nWr2TjteBemwbzpsRtp62VWJi63jY_iY013ghTYWUs3mkrK-kcrk2hK4l5iVdG4Eb6nbFrd4nOFa-cHHy_ffRyN1tO74PF0_xhOl4EIkyTKCBSxjQOs7RUKdA0BhKFo5gWULafDEoJKioykmZKcFCKgEoohQJSnsqEQkj76ObYV1jjnJWKCe2_xvWW64oRYIfTsHYhFrX66pfeWF1zu__jro9u1662_x-xfDY9yOAotfPy4yS5XbNRQpOYvT7O2WKeT_Ll84Tl9BNnXYMS |
| CitedBy_id | crossref_primary_10_1002_sec_23 crossref_primary_10_1007_s00530_011_0246_9 crossref_primary_10_1155_2009_945943 |
| Cites_doi | 10.1007/b99485 10.1145/288235.288252 10.1137/S0097539701398521 10.1007/3-540-44702-4_2 10.1145/778415.778449 10.1109/49.668972 10.1145/570645.570648 10.1007/3-540-45455-1_26 10.1109/3468.935042 10.1049/PBTE040E 10.1007/3-540-45682-1_30 10.3233/JCS-2002-10302 10.17487/rfc3561 10.1007/3-540-44647-8_13 10.1007/3-540-45708-9_23 10.1007/3-540-44702-4_1 10.1145/570681.570682 |
| ContentType | Journal Article |
| Copyright | Copyright © 2008 John Wiley & Sons, Ltd. |
| Copyright_xml | – notice: Copyright © 2008 John Wiley & Sons, Ltd. |
| DBID | BSCLL AAYXX CITATION |
| DOI | 10.1002/sec.4 |
| DatabaseName | Istex CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | CrossRef |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1939-0122 |
| EndPage | 189 |
| ExternalDocumentID | 10_1002_sec_4 SEC4 ark_67375_WNG_LGSBSTQB_S |
| Genre | article |
| GroupedDBID | .4S .DC 05W 0R~ 123 24P 31~ 3SF 4.4 52U 5DZ 66C 8-1 8UM AAESR AAEVG AAFWJ AAMMB AANHP AAONW AAZKR ACBWZ ACCMX ACGFO ACRPL ACXQS ACYXJ ADBBV ADIZJ ADMLS ADNMO AEFGJ AEIMD AENEX AFBPY AGQPQ AGXDD AIDQK AIDYY AJXKR ALMA_UNASSIGNED_HOLDINGS AMBMR ARCSS ASPBG ATUGU AVWKF AZFZN AZVAB BCNDV BDRZF BHBCM BNHUX BOGZA BRXPI BSCLL CS3 DR2 DU5 EBS EIS EJD F1Z FEDTE G-S GODZA H13 HVGLF HZ~ IX1 LH4 LITHE LW6 MY. MY~ NNB O9- OIG OK1 P2P PUEGO ROL SUPJJ TH9 TUS W99 WBKPD XV2 AAYXX CITATION |
| ID | FETCH-LOGICAL-c2874-1ee535298df803850142653b0d38590de0f4b9189fca0ff10f7330b08a8e73023 |
| IEDL.DBID | DR2 |
| ISSN | 1939-0114 |
| IngestDate | Thu Apr 24 22:57:13 EDT 2025 Wed Oct 01 02:25:49 EDT 2025 Sun Sep 21 06:27:07 EDT 2025 Sun Sep 21 06:20:36 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 2 |
| Language | English |
| License | http://onlinelibrary.wiley.com/termsAndConditions#vor |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c2874-1ee535298df803850142653b0d38590de0f4b9189fca0ff10f7330b08a8e73023 |
| Notes | istex:9F6368A33E27B4B20DFA3227588BC1A63210EAC1 ark:/67375/WNG-LGSBSTQB-S ArticleID:SEC4 |
| PageCount | 11 |
| ParticipantIDs | crossref_citationtrail_10_1002_sec_4 crossref_primary_10_1002_sec_4 wiley_primary_10_1002_sec_4_SEC4 istex_primary_ark_67375_WNG_LGSBSTQB_S |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | March/April 2008 |
| PublicationDateYYYYMMDD | 2008-03-01 |
| PublicationDate_xml | – month: 03 year: 2008 text: March/April 2008 |
| PublicationDecade | 2000 |
| PublicationPlace | Chichester, UK |
| PublicationPlace_xml | – name: Chichester, UK |
| PublicationTitle | Security and communication networks |
| PublicationTitleAlternate | Security Comm. Networks |
| PublicationYear | 2008 |
| Publisher | John Wiley & Sons, Ltd |
| Publisher_xml | – name: John Wiley & Sons, Ltd |
| References | Berg O, Berg T, Haavik S, Skaug R, Hjelmstad JF. Spread Spectrum in Mobile Communication. IEEE Press: Piscataway, NJ, USA, 1998. Boneh D, Franklin M. Identity based encryption from the Weil pairing. SIAM Computing 2003; 32(3): 586-615. Mohapatra P, Krishnamurthy S. Ad Hoc Networks: Technologies and Protocols. Springer: Berlin, 2005; xxi-xxiii. ISBN 0-387-22689-3 Levine BN, Shields C. Hordes: a multicast based protocol for anonymity. Journal of Computer Security 2002; 10(3): 213-240. ISSN: 0926-227X. Reed MG, Syverson PF, Goldschlag DM. Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communications, Special Issue on Copyright and Privacy Protection. 1998; 16(4): 482-494. Guan Y, Fu X, Xuan D, Shenoy P, Bettati R, Zhao W. NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applications. IEEE Transactions on Systems, Man, and Cybernetics 2001; 31(4): 253-265. Ilyas M. The Handbook of Ad Hoc Wireless Networks. CRC Press: Washington D.C., 2003. 1998 1998; 16 2005 2004 2003 2002 2001 2000 2003; 32 2001; 31 2002; 10 Levine BN (e_1_2_1_16_2) 2002; 10 e_1_2_1_22_2 e_1_2_1_23_2 e_1_2_1_20_2 e_1_2_1_21_2 e_1_2_1_26_2 e_1_2_1_27_2 e_1_2_1_24_2 e_1_2_1_25_2 e_1_2_1_28_2 e_1_2_1_29_2 Ilyas M (e_1_2_1_18_2) 2003 Lou W (e_1_2_1_3_2) 2003 e_1_2_1_6_2 e_1_2_1_30_2 e_1_2_1_7_2 e_1_2_1_4_2 e_1_2_1_5_2 e_1_2_1_2_2 e_1_2_1_11_2 e_1_2_1_34_2 e_1_2_1_12_2 e_1_2_1_33_2 e_1_2_1_32_2 e_1_2_1_10_2 e_1_2_1_31_2 e_1_2_1_15_2 e_1_2_1_13_2 e_1_2_1_14_2 e_1_2_1_35_2 e_1_2_1_19_2 e_1_2_1_8_2 e_1_2_1_17_2 e_1_2_1_9_2 |
| References_xml | – reference: Levine BN, Shields C. Hordes: a multicast based protocol for anonymity. Journal of Computer Security 2002; 10(3): 213-240. ISSN: 0926-227X. – reference: Guan Y, Fu X, Xuan D, Shenoy P, Bettati R, Zhao W. NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applications. IEEE Transactions on Systems, Man, and Cybernetics 2001; 31(4): 253-265. – reference: Ilyas M. The Handbook of Ad Hoc Wireless Networks. CRC Press: Washington D.C., 2003. – reference: Berg O, Berg T, Haavik S, Skaug R, Hjelmstad JF. Spread Spectrum in Mobile Communication. IEEE Press: Piscataway, NJ, USA, 1998. – reference: Boneh D, Franklin M. Identity based encryption from the Weil pairing. SIAM Computing 2003; 32(3): 586-615. – reference: Mohapatra P, Krishnamurthy S. Ad Hoc Networks: Technologies and Protocols. Springer: Berlin, 2005; xxi-xxiii. ISBN 0-387-22689-3 – reference: Reed MG, Syverson PF, Goldschlag DM. Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communications, Special Issue on Copyright and Privacy Protection. 1998; 16(4): 482-494. – start-page: 324 year: 2002 end-page: 337 – volume: 31 start-page: 253 issue: 4 year: 2001 end-page: 265 article-title: NetCamo: camouflaging network traffic for QoS‐guaranteed mission critical applications publication-title: IEEE Transactions on Systems, Man, and Cybernetics – volume: 16 start-page: 482 issue: 4 year: 1998 end-page: 494 article-title: Anonymous connections and onion routing publication-title: IEEE Journal on Selected Areas in Communications – start-page: xxi year: 2005 end-page: xxiii – volume: 10 start-page: 213 issue: 3 year: 2002 end-page: 240 article-title: Hordes: a multicast based protocol for anonymity publication-title: Journal of Computer Security – year: 2002 – year: 2001 – year: 2003 – start-page: 291 year: 2003 end-page: 302 – start-page: 1 year: 2004 end-page: 6 – start-page: 354 year: 2002 end-page: 368 – start-page: 514 year: 2001 end-page: 532 – volume: 32 start-page: 586 issue: 3 year: 2003 end-page: 615 article-title: Identity based encryption from the Weil pairing publication-title: SIAM Computing – year: 2000 – start-page: 12 year: 2002 end-page: 23 – start-page: 10 year: 2001 end-page: 29 – start-page: 1153 year: 2001 end-page: 1158 – start-page: 66 year: 1998 end-page: 75 – start-page: 213 year: 2001 end-page: 229 – year: 1998 – ident: e_1_2_1_11_2 – ident: e_1_2_1_17_2 – ident: e_1_2_1_2_2 doi: 10.1007/b99485 – ident: e_1_2_1_27_2 doi: 10.1145/288235.288252 – volume-title: Ad Hoc Wireless Networking year: 2003 ident: e_1_2_1_3_2 – ident: e_1_2_1_19_2 doi: 10.1137/S0097539701398521 – ident: e_1_2_1_25_2 doi: 10.1007/3-540-44702-4_2 – ident: e_1_2_1_15_2 doi: 10.1145/778415.778449 – ident: e_1_2_1_14_2 doi: 10.1109/49.668972 – ident: e_1_2_1_28_2 doi: 10.1145/570645.570648 – ident: e_1_2_1_5_2 – ident: e_1_2_1_13_2 – ident: e_1_2_1_21_2 doi: 10.1007/3-540-45455-1_26 – ident: e_1_2_1_30_2 – ident: e_1_2_1_9_2 – ident: e_1_2_1_10_2 – ident: e_1_2_1_4_2 doi: 10.1109/3468.935042 – ident: e_1_2_1_6_2 doi: 10.1049/PBTE040E – volume-title: The Handbook of Ad Hoc Wireless Networks year: 2003 ident: e_1_2_1_18_2 – ident: e_1_2_1_23_2 doi: 10.1007/3-540-45682-1_30 – ident: e_1_2_1_32_2 – ident: e_1_2_1_35_2 – ident: e_1_2_1_7_2 – volume: 10 start-page: 213 issue: 3 year: 2002 ident: e_1_2_1_16_2 article-title: Hordes: a multicast based protocol for anonymity publication-title: Journal of Computer Security doi: 10.3233/JCS-2002-10302 – ident: e_1_2_1_8_2 doi: 10.17487/rfc3561 – ident: e_1_2_1_24_2 – ident: e_1_2_1_22_2 doi: 10.1007/3-540-44647-8_13 – ident: e_1_2_1_20_2 doi: 10.1007/3-540-45708-9_23 – ident: e_1_2_1_33_2 doi: 10.1007/3-540-44702-4_1 – ident: e_1_2_1_34_2 – ident: e_1_2_1_26_2 – ident: e_1_2_1_12_2 – ident: e_1_2_1_29_2 doi: 10.1145/570681.570682 – ident: e_1_2_1_31_2 |
| SSID | ssj0061474 |
| Score | 1.7370282 |
| Snippet | The main characteristic of a mobile ad hoc network (MANET) is its infrastructure‐less, highly dynamic topology, which is subject to malicious traffic analysis.... The main characteristic of a mobile ad hoc network (MANET) is its infrastructure‐less, highly dynamic topology, which is subject to malicious traffic analysis.... |
| SourceID | crossref wiley istex |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 179 |
| SubjectTerms | ad hoc network anonymity pairing-based cryptography routing security |
| Title | Anonymous authentication and secure communication protocol for wireless mobile ad hoc networks |
| URI | https://api.istex.fr/ark:/67375/WNG-LGSBSTQB-S/fulltext.pdf https://onlinelibrary.wiley.com/doi/abs/10.1002%2Fsec.4 |
| Volume | 1 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVWIB databaseName: Wiley Online Library - Core collection (SURFmarket) issn: 1939-0114 databaseCode: DR2 dateStart: 20070101 customDbUrl: isFulltext: true eissn: 1939-0122 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0061474 providerName: Wiley-Blackwell |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dS8MwEA8yQRTxW5wfIw_iW7e0TZv20Y19IDrQbbgnS5KmCJudrB2If725ttZtCIKPpUm55u5yl8svvyB0LS3q2FqxhhTEMahJtc85ITU4YcIMhWBedor_oe_2RvRu7IyL0gWchcn5IcqCG3hGNl-Dg3ORNH5IQxMl68ADatputpR6KmmjdMRhxW4yYIFMuoV2i36NrNdKDNqE4fxYzU2z4NLZR-NvsXJMyaS-SEVdfq4xNv5D7gO0VySc-Da3kEO0oeIjtLNEQ3iMXsoaAOYAeI_TopCHeRziBCryCsvlkyQY6B1m2oawznkx0B1P9YyJ32ZCi4R5iF9nEsc5wjw5QaNOe9jqGcW9C4YE9nvDVApIX3wvjDzYONSrKMt1bEFC_eCTUJGICt_0_EhyEkUmiZhtE0E87ikGlxCdooqWW50h7FqUKUhxdFpA3ZBxvR6Vrisd5TtKEFbV1lJoIpAFKTncjTENcjplK9A_GdAqqpXN3nMWjvUGN5kay7d8PgHIGnOC5343uO8OmoPhYzMYVBHOlPP7Z4JBu0XP_25ygbZz3Ahg0S5RJZ0v1JVOTlJRyyzxCxCN45c |
| linkProvider | Wiley-Blackwell |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bS8MwFD54AS-Id3FeZh7Et27pljbtoxtzU-dAt-F8MTRpirC5yTZB_PXmtLXqEAQfS5NymnOSfDn58gXgVJWYUzaOtZSkjsVsZvqcEzIroFzaoZTci0_x37TcRpdd9ZzeHHifZ2ESfYgs4YY9Ix6vsYNjQrr4pRo60arA5mGRuWaNgnDoLhOOMnMOT_eTkQ1ksyVYSysW42o_ZqFFbNC3n-g0nl4uNuDh07CEVdIvvE5lQb3PaDb-x_JNWE8xJzlPgmQL5vRwG1a_KRHuwGOWBiABct6H0zSXR4JhSCaYlNdEfT9MQlDhYWTCiBjYS1DxeGAGTfI8ksYmEoTkaaTIMCGZT3ahe1HrVBtWevWCpVAA37K1Rt0X3wsjD_cOzUKq5DplSUPz4NNQ04hJ3_b8SAU0imwa8XKZSuoFnuZ4D9EeLBi79T4Qt8S4RpRjkAFzQx6YJalyXeVo39GS8pwJmNQVQqW65Hg9xkAkisolYX5SsBzks2IviRDHbIGz2I_Z22DcR9Yad8R9qy6a9Xal3bmtiHYOSOyd3z8j2rUqO_i7yAksNzo3TdG8bF0fwkpCI0Fq2hEsTMev-thglanMx2H5AVAN57g |
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3rS8MwED-mgijiW5zPfBC_daZb0rQffW0-hzpF_WJoHkXY3IabIP715tpaHwiCH0uTcs3d5S6XX34B2NJVxmtOsZ5WlHvMZ87nuGFeTIXyjVIiTE_xnzeDoxt2csfvShB-nIXJ-CGKght6Rjpfo4Pbvkl2PllDB1ZX2AiMMR6FCOY7uCqIo1zMEfl-MqKBfDYOU3nHnbTbtyg0hgP6-j07TcNLfQbuPwTLUCXtystQVfTbD87G_0g-C9N5zkl2MyOZg5LtzsPkFybCBXgoygAkRsx7d5jX8kjcNWSARXlL9NfDJAQZHnrOjIhLewkyHnfcpEmeesrJRGJDHnuadDOQ-WARbuqH1_tHXn71gqeRAN_zrUXelyg0SYh7h24hVQ14TVHjHiJqLE2YivwwSnRMk8SniajVqKJhHFqB9xAtwaiT2y4DCapMWMxyXGbAAiNityTVQaC5jbhVVJSdweSqkDrnJcfrMToyY1SuSveTkpVho2jWz4g4fjbYTvVYvI2f24haE1zeNhvyrNHaa11f7slWGUiqnd8_I1uH-2zl7yabMH5xUJdnx83TVZjIUCSITFuD0eHzi113qcpQbaRW-Q4Zwuc8 |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Anonymous+authentication+and+secure+communication+protocol+for+wireless+mobile+ad+hoc+networks&rft.jtitle=Security+and+communication+networks&rft.au=Mizanur+Rahman%2C+Sk.+Md&rft.au=Nasser%2C+Nidal&rft.au=Inomata%2C+Atsuo&rft.au=Okamoto%2C+Takeshi&rft.date=2008-03-01&rft.pub=John+Wiley+%26+Sons%2C+Ltd&rft.issn=1939-0114&rft.eissn=1939-0122&rft.volume=1&rft.issue=2&rft.spage=179&rft.epage=189&rft_id=info:doi/10.1002%2Fsec.4&rft.externalDBID=n%2Fa&rft.externalDocID=ark_67375_WNG_LGSBSTQB_S |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1939-0114&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1939-0114&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1939-0114&client=summon |