Anonymous authentication and secure communication protocol for wireless mobile ad hoc networks

The main characteristic of a mobile ad hoc network (MANET) is its infrastructure‐less, highly dynamic topology, which is subject to malicious traffic analysis. Malicious intermediate nodes in MANETs are a threat concerning security as well as anonymity of exchanged information. In this paper, we pro...

Full description

Saved in:
Bibliographic Details
Published inSecurity and communication networks Vol. 1; no. 2; pp. 179 - 189
Main Authors Mizanur Rahman, Sk. Md, Nasser, Nidal, Inomata, Atsuo, Okamoto, Takeshi, Mambo, Masahiro, Okamoto, Eiji
Format Journal Article
LanguageEnglish
Published Chichester, UK John Wiley & Sons, Ltd 01.03.2008
Subjects
Online AccessGet full text
ISSN1939-0114
1939-0122
DOI10.1002/sec.4

Cover

Abstract The main characteristic of a mobile ad hoc network (MANET) is its infrastructure‐less, highly dynamic topology, which is subject to malicious traffic analysis. Malicious intermediate nodes in MANETs are a threat concerning security as well as anonymity of exchanged information. In this paper, we propose an anonymous on‐demand routing protocol, called RINOMO, to protect anonymity and achieve security of nodes in MANETs. After successful authentication of the legitimate nodes in the network they can use their pseudo IDs for secure communication. Pseudo IDs of the nodes are generated considering pairing‐based cryptography. Nodes can generate their pseudo IDs independently and dynamically without consulting with system administrator. As a result, RINOMO reduces pseudo IDs maintenance costs. Only trust‐worthy nodes are allowed to take part in routing to discover a route. To ensure trustiness each node has to make authentication to its neighbors through the designed anonymous authentication process. Thus, RINOMO safely communicates between nodes without disclosing node identities. It also provides different desirable anonymous properties such as identity privacy, location privacy, route anonymity, and robustness against several attacks. Mathematical analysis of privacy loss is also evaluated and it shows there is no loss of privacy with respect to time. Thus, RINOMO is an anonymous robust protocol in MANETs. Copyright © 2008 John Wiley & Sons, Ltd.
AbstractList The main characteristic of a mobile ad hoc network (MANET) is its infrastructure‐less, highly dynamic topology, which is subject to malicious traffic analysis. Malicious intermediate nodes in MANETs are a threat concerning security as well as anonymity of exchanged information. In this paper, we propose an anonymous on‐demand routing protocol, called RINOMO, to protect anonymity and achieve security of nodes in MANETs. After successful authentication of the legitimate nodes in the network they can use their pseudo IDs for secure communication. Pseudo IDs of the nodes are generated considering pairing‐based cryptography. Nodes can generate their pseudo IDs independently and dynamically without consulting with system administrator. As a result, RINOMO reduces pseudo IDs maintenance costs. Only trust‐worthy nodes are allowed to take part in routing to discover a route. To ensure trustiness each node has to make authentication to its neighbors through the designed anonymous authentication process. Thus, RINOMO safely communicates between nodes without disclosing node identities. It also provides different desirable anonymous properties such as identity privacy, location privacy, route anonymity, and robustness against several attacks. Mathematical analysis of privacy loss is also evaluated and it shows there is no loss of privacy with respect to time. Thus, RINOMO is an anonymous robust protocol in MANETs. Copyright © 2008 John Wiley & Sons, Ltd.
The main characteristic of a mobile ad hoc network (MANET) is its infrastructure‐less, highly dynamic topology, which is subject to malicious traffic analysis. Malicious intermediate nodes in MANETs are a threat concerning security as well as anonymity of exchanged information. In this paper, we propose an anonymous on‐demand routing protocol, called RINOMO, to protect anonymity and achieve security of nodes in MANETs. After successful authentication of the legitimate nodes in the network they can use their pseudo IDs for secure communication. Pseudo IDs of the nodes are generated considering pairing‐based cryptography. Nodes can generate their pseudo IDs independently and dynamically without consulting with system administrator. As a result, RINOMO reduces pseudo IDs maintenance costs. Only trust‐worthy nodes are allowed to take part in routing to discover a route. To ensure trustiness each node has to make authentication to its neighbors through the designed anonymous authentication process. Thus, RINOMO safely communicates between nodes without disclosing node identities. It also provides different desirable anonymous properties such as identity privacy, location privacy, route anonymity, and robustness against several attacks. Mathematical analysis of privacy loss is also evaluated and it shows there is no loss of privacy with respect to time. Thus, RINOMO is an anonymous robust protocol in MANETs. Copyright © 2008 John Wiley & Sons, Ltd.
Author Mizanur Rahman, Sk. Md
Inomata, Atsuo
Okamoto, Eiji
Mambo, Masahiro
Nasser, Nidal
Okamoto, Takeshi
Author_xml – sequence: 1
  givenname: Sk. Md
  surname: Mizanur Rahman
  fullname: Mizanur Rahman, Sk. Md
  organization: Department of Computing and Information Science, University of Guelph, Guelph, Ontario N1G 2W1, Canada
– sequence: 2
  givenname: Nidal
  surname: Nasser
  fullname: Nasser, Nidal
  email: nasser@cis.uoguelph.ca
  organization: Department of Computing and Information Science, University of Guelph, Guelph, Ontario N1G 2W1, Canada
– sequence: 3
  givenname: Atsuo
  surname: Inomata
  fullname: Inomata, Atsuo
  organization: Japan Science and Technology Agency, Resona-Maruha Bldg, 18F, 1-1-2 Otemachi, Chiyoda-ku, Tokyo 100-0005, Japan
– sequence: 4
  givenname: Takeshi
  surname: Okamoto
  fullname: Okamoto, Takeshi
  organization: Graduate School of Systems and Information Engineering, University of Tsukuba, 1-1-1 Tennodai, Tsukuba, Ibaraki 305-8573, Japan
– sequence: 5
  givenname: Masahiro
  surname: Mambo
  fullname: Mambo, Masahiro
  organization: Graduate School of Systems and Information Engineering, University of Tsukuba, 1-1-1 Tennodai, Tsukuba, Ibaraki 305-8573, Japan
– sequence: 6
  givenname: Eiji
  surname: Okamoto
  fullname: Okamoto, Eiji
  organization: Graduate School of Systems and Information Engineering, University of Tsukuba, 1-1-1 Tennodai, Tsukuba, Ibaraki 305-8573, Japan
BookMark eNpt0FFPwjAQAODGYCIg_6EvxgczvK4b2x6BIJoQjRnGN5uua0NlW0lbgvx7hygP6lOvue8ud9dDncY0EqEBgSEBCG-dFMPoDHVJRrMASBh2TjGJLlDPuXeAEYmSqIvexm3xvjZbh_nWr2TjteBemwbzpsRtp62VWJi63jY_iY013ghTYWUs3mkrK-kcrk2hK4l5iVdG4Eb6nbFrd4nOFa-cHHy_ffRyN1tO74PF0_xhOl4EIkyTKCBSxjQOs7RUKdA0BhKFo5gWULafDEoJKioykmZKcFCKgEoohQJSnsqEQkj76ObYV1jjnJWKCe2_xvWW64oRYIfTsHYhFrX66pfeWF1zu__jro9u1662_x-xfDY9yOAotfPy4yS5XbNRQpOYvT7O2WKeT_Ll84Tl9BNnXYMS
CitedBy_id crossref_primary_10_1002_sec_23
crossref_primary_10_1007_s00530_011_0246_9
crossref_primary_10_1155_2009_945943
Cites_doi 10.1007/b99485
10.1145/288235.288252
10.1137/S0097539701398521
10.1007/3-540-44702-4_2
10.1145/778415.778449
10.1109/49.668972
10.1145/570645.570648
10.1007/3-540-45455-1_26
10.1109/3468.935042
10.1049/PBTE040E
10.1007/3-540-45682-1_30
10.3233/JCS-2002-10302
10.17487/rfc3561
10.1007/3-540-44647-8_13
10.1007/3-540-45708-9_23
10.1007/3-540-44702-4_1
10.1145/570681.570682
ContentType Journal Article
Copyright Copyright © 2008 John Wiley & Sons, Ltd.
Copyright_xml – notice: Copyright © 2008 John Wiley & Sons, Ltd.
DBID BSCLL
AAYXX
CITATION
DOI 10.1002/sec.4
DatabaseName Istex
CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
CrossRef
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1939-0122
EndPage 189
ExternalDocumentID 10_1002_sec_4
SEC4
ark_67375_WNG_LGSBSTQB_S
Genre article
GroupedDBID .4S
.DC
05W
0R~
123
24P
31~
3SF
4.4
52U
5DZ
66C
8-1
8UM
AAESR
AAEVG
AAFWJ
AAMMB
AANHP
AAONW
AAZKR
ACBWZ
ACCMX
ACGFO
ACRPL
ACXQS
ACYXJ
ADBBV
ADIZJ
ADMLS
ADNMO
AEFGJ
AEIMD
AENEX
AFBPY
AGQPQ
AGXDD
AIDQK
AIDYY
AJXKR
ALMA_UNASSIGNED_HOLDINGS
AMBMR
ARCSS
ASPBG
ATUGU
AVWKF
AZFZN
AZVAB
BCNDV
BDRZF
BHBCM
BNHUX
BOGZA
BRXPI
BSCLL
CS3
DR2
DU5
EBS
EIS
EJD
F1Z
FEDTE
G-S
GODZA
H13
HVGLF
HZ~
IX1
LH4
LITHE
LW6
MY.
MY~
NNB
O9-
OIG
OK1
P2P
PUEGO
ROL
SUPJJ
TH9
TUS
W99
WBKPD
XV2
AAYXX
CITATION
ID FETCH-LOGICAL-c2874-1ee535298df803850142653b0d38590de0f4b9189fca0ff10f7330b08a8e73023
IEDL.DBID DR2
ISSN 1939-0114
IngestDate Thu Apr 24 22:57:13 EDT 2025
Wed Oct 01 02:25:49 EDT 2025
Sun Sep 21 06:27:07 EDT 2025
Sun Sep 21 06:20:36 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 2
Language English
License http://onlinelibrary.wiley.com/termsAndConditions#vor
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c2874-1ee535298df803850142653b0d38590de0f4b9189fca0ff10f7330b08a8e73023
Notes istex:9F6368A33E27B4B20DFA3227588BC1A63210EAC1
ark:/67375/WNG-LGSBSTQB-S
ArticleID:SEC4
PageCount 11
ParticipantIDs crossref_citationtrail_10_1002_sec_4
crossref_primary_10_1002_sec_4
wiley_primary_10_1002_sec_4_SEC4
istex_primary_ark_67375_WNG_LGSBSTQB_S
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate March/April 2008
PublicationDateYYYYMMDD 2008-03-01
PublicationDate_xml – month: 03
  year: 2008
  text: March/April 2008
PublicationDecade 2000
PublicationPlace Chichester, UK
PublicationPlace_xml – name: Chichester, UK
PublicationTitle Security and communication networks
PublicationTitleAlternate Security Comm. Networks
PublicationYear 2008
Publisher John Wiley & Sons, Ltd
Publisher_xml – name: John Wiley & Sons, Ltd
References Berg O, Berg T, Haavik S, Skaug R, Hjelmstad JF. Spread Spectrum in Mobile Communication. IEEE Press: Piscataway, NJ, USA, 1998.
Boneh D, Franklin M. Identity based encryption from the Weil pairing. SIAM Computing 2003; 32(3): 586-615.
Mohapatra P, Krishnamurthy S. Ad Hoc Networks: Technologies and Protocols. Springer: Berlin, 2005; xxi-xxiii. ISBN 0-387-22689-3
Levine BN, Shields C. Hordes: a multicast based protocol for anonymity. Journal of Computer Security 2002; 10(3): 213-240. ISSN: 0926-227X.
Reed MG, Syverson PF, Goldschlag DM. Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communications, Special Issue on Copyright and Privacy Protection. 1998; 16(4): 482-494.
Guan Y, Fu X, Xuan D, Shenoy P, Bettati R, Zhao W. NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applications. IEEE Transactions on Systems, Man, and Cybernetics 2001; 31(4): 253-265.
Ilyas M. The Handbook of Ad Hoc Wireless Networks. CRC Press: Washington D.C., 2003.
1998
1998; 16
2005
2004
2003
2002
2001
2000
2003; 32
2001; 31
2002; 10
Levine BN (e_1_2_1_16_2) 2002; 10
e_1_2_1_22_2
e_1_2_1_23_2
e_1_2_1_20_2
e_1_2_1_21_2
e_1_2_1_26_2
e_1_2_1_27_2
e_1_2_1_24_2
e_1_2_1_25_2
e_1_2_1_28_2
e_1_2_1_29_2
Ilyas M (e_1_2_1_18_2) 2003
Lou W (e_1_2_1_3_2) 2003
e_1_2_1_6_2
e_1_2_1_30_2
e_1_2_1_7_2
e_1_2_1_4_2
e_1_2_1_5_2
e_1_2_1_2_2
e_1_2_1_11_2
e_1_2_1_34_2
e_1_2_1_12_2
e_1_2_1_33_2
e_1_2_1_32_2
e_1_2_1_10_2
e_1_2_1_31_2
e_1_2_1_15_2
e_1_2_1_13_2
e_1_2_1_14_2
e_1_2_1_35_2
e_1_2_1_19_2
e_1_2_1_8_2
e_1_2_1_17_2
e_1_2_1_9_2
References_xml – reference: Levine BN, Shields C. Hordes: a multicast based protocol for anonymity. Journal of Computer Security 2002; 10(3): 213-240. ISSN: 0926-227X.
– reference: Guan Y, Fu X, Xuan D, Shenoy P, Bettati R, Zhao W. NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applications. IEEE Transactions on Systems, Man, and Cybernetics 2001; 31(4): 253-265.
– reference: Ilyas M. The Handbook of Ad Hoc Wireless Networks. CRC Press: Washington D.C., 2003.
– reference: Berg O, Berg T, Haavik S, Skaug R, Hjelmstad JF. Spread Spectrum in Mobile Communication. IEEE Press: Piscataway, NJ, USA, 1998.
– reference: Boneh D, Franklin M. Identity based encryption from the Weil pairing. SIAM Computing 2003; 32(3): 586-615.
– reference: Mohapatra P, Krishnamurthy S. Ad Hoc Networks: Technologies and Protocols. Springer: Berlin, 2005; xxi-xxiii. ISBN 0-387-22689-3
– reference: Reed MG, Syverson PF, Goldschlag DM. Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communications, Special Issue on Copyright and Privacy Protection. 1998; 16(4): 482-494.
– start-page: 324
  year: 2002
  end-page: 337
– volume: 31
  start-page: 253
  issue: 4
  year: 2001
  end-page: 265
  article-title: NetCamo: camouflaging network traffic for QoS‐guaranteed mission critical applications
  publication-title: IEEE Transactions on Systems, Man, and Cybernetics
– volume: 16
  start-page: 482
  issue: 4
  year: 1998
  end-page: 494
  article-title: Anonymous connections and onion routing
  publication-title: IEEE Journal on Selected Areas in Communications
– start-page: xxi
  year: 2005
  end-page: xxiii
– volume: 10
  start-page: 213
  issue: 3
  year: 2002
  end-page: 240
  article-title: Hordes: a multicast based protocol for anonymity
  publication-title: Journal of Computer Security
– year: 2002
– year: 2001
– year: 2003
– start-page: 291
  year: 2003
  end-page: 302
– start-page: 1
  year: 2004
  end-page: 6
– start-page: 354
  year: 2002
  end-page: 368
– start-page: 514
  year: 2001
  end-page: 532
– volume: 32
  start-page: 586
  issue: 3
  year: 2003
  end-page: 615
  article-title: Identity based encryption from the Weil pairing
  publication-title: SIAM Computing
– year: 2000
– start-page: 12
  year: 2002
  end-page: 23
– start-page: 10
  year: 2001
  end-page: 29
– start-page: 1153
  year: 2001
  end-page: 1158
– start-page: 66
  year: 1998
  end-page: 75
– start-page: 213
  year: 2001
  end-page: 229
– year: 1998
– ident: e_1_2_1_11_2
– ident: e_1_2_1_17_2
– ident: e_1_2_1_2_2
  doi: 10.1007/b99485
– ident: e_1_2_1_27_2
  doi: 10.1145/288235.288252
– volume-title: Ad Hoc Wireless Networking
  year: 2003
  ident: e_1_2_1_3_2
– ident: e_1_2_1_19_2
  doi: 10.1137/S0097539701398521
– ident: e_1_2_1_25_2
  doi: 10.1007/3-540-44702-4_2
– ident: e_1_2_1_15_2
  doi: 10.1145/778415.778449
– ident: e_1_2_1_14_2
  doi: 10.1109/49.668972
– ident: e_1_2_1_28_2
  doi: 10.1145/570645.570648
– ident: e_1_2_1_5_2
– ident: e_1_2_1_13_2
– ident: e_1_2_1_21_2
  doi: 10.1007/3-540-45455-1_26
– ident: e_1_2_1_30_2
– ident: e_1_2_1_9_2
– ident: e_1_2_1_10_2
– ident: e_1_2_1_4_2
  doi: 10.1109/3468.935042
– ident: e_1_2_1_6_2
  doi: 10.1049/PBTE040E
– volume-title: The Handbook of Ad Hoc Wireless Networks
  year: 2003
  ident: e_1_2_1_18_2
– ident: e_1_2_1_23_2
  doi: 10.1007/3-540-45682-1_30
– ident: e_1_2_1_32_2
– ident: e_1_2_1_35_2
– ident: e_1_2_1_7_2
– volume: 10
  start-page: 213
  issue: 3
  year: 2002
  ident: e_1_2_1_16_2
  article-title: Hordes: a multicast based protocol for anonymity
  publication-title: Journal of Computer Security
  doi: 10.3233/JCS-2002-10302
– ident: e_1_2_1_8_2
  doi: 10.17487/rfc3561
– ident: e_1_2_1_24_2
– ident: e_1_2_1_22_2
  doi: 10.1007/3-540-44647-8_13
– ident: e_1_2_1_20_2
  doi: 10.1007/3-540-45708-9_23
– ident: e_1_2_1_33_2
  doi: 10.1007/3-540-44702-4_1
– ident: e_1_2_1_34_2
– ident: e_1_2_1_26_2
– ident: e_1_2_1_12_2
– ident: e_1_2_1_29_2
  doi: 10.1145/570681.570682
– ident: e_1_2_1_31_2
SSID ssj0061474
Score 1.7370282
Snippet The main characteristic of a mobile ad hoc network (MANET) is its infrastructure‐less, highly dynamic topology, which is subject to malicious traffic analysis....
The main characteristic of a mobile ad hoc network (MANET) is its infrastructure‐less, highly dynamic topology, which is subject to malicious traffic analysis....
SourceID crossref
wiley
istex
SourceType Enrichment Source
Index Database
Publisher
StartPage 179
SubjectTerms ad hoc network
anonymity
pairing-based cryptography
routing
security
Title Anonymous authentication and secure communication protocol for wireless mobile ad hoc networks
URI https://api.istex.fr/ark:/67375/WNG-LGSBSTQB-S/fulltext.pdf
https://onlinelibrary.wiley.com/doi/abs/10.1002%2Fsec.4
Volume 1
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVWIB
  databaseName: Wiley Online Library - Core collection (SURFmarket)
  issn: 1939-0114
  databaseCode: DR2
  dateStart: 20070101
  customDbUrl:
  isFulltext: true
  eissn: 1939-0122
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0061474
  providerName: Wiley-Blackwell
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dS8MwEA8yQRTxW5wfIw_iW7e0TZv20Y19IDrQbbgnS5KmCJudrB2If725ttZtCIKPpUm55u5yl8svvyB0LS3q2FqxhhTEMahJtc85ITU4YcIMhWBedor_oe_2RvRu7IyL0gWchcn5IcqCG3hGNl-Dg3ORNH5IQxMl68ADatputpR6KmmjdMRhxW4yYIFMuoV2i36NrNdKDNqE4fxYzU2z4NLZR-NvsXJMyaS-SEVdfq4xNv5D7gO0VySc-Da3kEO0oeIjtLNEQ3iMXsoaAOYAeI_TopCHeRziBCryCsvlkyQY6B1m2oawznkx0B1P9YyJ32ZCi4R5iF9nEsc5wjw5QaNOe9jqGcW9C4YE9nvDVApIX3wvjDzYONSrKMt1bEFC_eCTUJGICt_0_EhyEkUmiZhtE0E87ikGlxCdooqWW50h7FqUKUhxdFpA3ZBxvR6Vrisd5TtKEFbV1lJoIpAFKTncjTENcjplK9A_GdAqqpXN3nMWjvUGN5kay7d8PgHIGnOC5343uO8OmoPhYzMYVBHOlPP7Z4JBu0XP_25ygbZz3Ahg0S5RJZ0v1JVOTlJRyyzxCxCN45c
linkProvider Wiley-Blackwell
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bS8MwFD54AS-Id3FeZh7Et27pljbtoxtzU-dAt-F8MTRpirC5yTZB_PXmtLXqEAQfS5NymnOSfDn58gXgVJWYUzaOtZSkjsVsZvqcEzIroFzaoZTci0_x37TcRpdd9ZzeHHifZ2ESfYgs4YY9Ix6vsYNjQrr4pRo60arA5mGRuWaNgnDoLhOOMnMOT_eTkQ1ksyVYSysW42o_ZqFFbNC3n-g0nl4uNuDh07CEVdIvvE5lQb3PaDb-x_JNWE8xJzlPgmQL5vRwG1a_KRHuwGOWBiABct6H0zSXR4JhSCaYlNdEfT9MQlDhYWTCiBjYS1DxeGAGTfI8ksYmEoTkaaTIMCGZT3ahe1HrVBtWevWCpVAA37K1Rt0X3wsjD_cOzUKq5DplSUPz4NNQ04hJ3_b8SAU0imwa8XKZSuoFnuZ4D9EeLBi79T4Qt8S4RpRjkAFzQx6YJalyXeVo39GS8pwJmNQVQqW65Hg9xkAkisolYX5SsBzks2IviRDHbIGz2I_Z22DcR9Yad8R9qy6a9Xal3bmtiHYOSOyd3z8j2rUqO_i7yAksNzo3TdG8bF0fwkpCI0Fq2hEsTMev-thglanMx2H5AVAN57g
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3rS8MwED-mgijiW5zPfBC_daZb0rQffW0-hzpF_WJoHkXY3IabIP715tpaHwiCH0uTcs3d5S6XX34B2NJVxmtOsZ5WlHvMZ87nuGFeTIXyjVIiTE_xnzeDoxt2csfvShB-nIXJ-CGKght6Rjpfo4Pbvkl2PllDB1ZX2AiMMR6FCOY7uCqIo1zMEfl-MqKBfDYOU3nHnbTbtyg0hgP6-j07TcNLfQbuPwTLUCXtystQVfTbD87G_0g-C9N5zkl2MyOZg5LtzsPkFybCBXgoygAkRsx7d5jX8kjcNWSARXlL9NfDJAQZHnrOjIhLewkyHnfcpEmeesrJRGJDHnuadDOQ-WARbuqH1_tHXn71gqeRAN_zrUXelyg0SYh7h24hVQ14TVHjHiJqLE2YivwwSnRMk8SniajVqKJhHFqB9xAtwaiT2y4DCapMWMxyXGbAAiNityTVQaC5jbhVVJSdweSqkDrnJcfrMToyY1SuSveTkpVho2jWz4g4fjbYTvVYvI2f24haE1zeNhvyrNHaa11f7slWGUiqnd8_I1uH-2zl7yabMH5xUJdnx83TVZjIUCSITFuD0eHzi113qcpQbaRW-Q4Zwuc8
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Anonymous+authentication+and+secure+communication+protocol+for+wireless+mobile+ad+hoc+networks&rft.jtitle=Security+and+communication+networks&rft.au=Mizanur+Rahman%2C+Sk.+Md&rft.au=Nasser%2C+Nidal&rft.au=Inomata%2C+Atsuo&rft.au=Okamoto%2C+Takeshi&rft.date=2008-03-01&rft.pub=John+Wiley+%26+Sons%2C+Ltd&rft.issn=1939-0114&rft.eissn=1939-0122&rft.volume=1&rft.issue=2&rft.spage=179&rft.epage=189&rft_id=info:doi/10.1002%2Fsec.4&rft.externalDBID=n%2Fa&rft.externalDocID=ark_67375_WNG_LGSBSTQB_S
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1939-0114&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1939-0114&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1939-0114&client=summon