Anonymous Secure Communication in Wireless Mobile Ad-Hoc Networks

The main characteristic of a mobile ad-hoc network is its infrastructure-less, highly dynamic topology, which is subject to malicious traffic analysis. Malicious intermediate nodes in wireless mobile ad-hoc networks are a threat concerning security as well as anonymity of exchanged information. To p...

Full description

Saved in:
Bibliographic Details
Published inUbiquitous Convergence Technology Vol. 4412; pp. 140 - 149
Main Authors Rahman, Sk. Md. Mizanur, Inomata, Atsuo, Okamoto, Takeshi, Mambo, Masahiro, Okamoto, Eiji
Format Book Chapter
LanguageEnglish
Published Germany Springer Berlin / Heidelberg 2007
Springer Berlin Heidelberg
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text
ISBN3540717889
9783540717881
ISSN0302-9743
1611-3349
DOI10.1007/978-3-540-71789-8_15

Cover

More Information
Summary:The main characteristic of a mobile ad-hoc network is its infrastructure-less, highly dynamic topology, which is subject to malicious traffic analysis. Malicious intermediate nodes in wireless mobile ad-hoc networks are a threat concerning security as well as anonymity of exchanged information. To protect anonymity and achieve security of nodes in mobile ad-hoc networks, an anonymous on-demand routing protocol, termed RIOMO, is proposed. For this purpose, pseudo IDs of the nodes are generated considering Pairing-based Cryptography. Nodes can generate their own pseudo IDs independently. As a result RIOMO reduces pseudo IDs maintenance costs. Only trust-worthy nodes are allowed to take part in routing to discover a route. To ensure trustiness each node has to make authentication to its neighbors through an anonymous authentication process. Thus RIOMO safely communicates between nodes without disclosing node identities; it also provides different desirable anonymous properties such as identity privacy, location privacy, route anonymity, and robustness against several attacks.
ISBN:3540717889
9783540717881
ISSN:0302-9743
1611-3349
DOI:10.1007/978-3-540-71789-8_15