Anonymous Secure Communication in Wireless Mobile Ad-Hoc Networks

The main characteristic of a mobile ad-hoc network is its infrastructure-less, highly dynamic topology, which is subject to malicious traffic analysis. Malicious intermediate nodes in wireless mobile ad-hoc networks are a threat concerning security as well as anonymity of exchanged information. To p...

Full description

Saved in:
Bibliographic Details
Published inUbiquitous Convergence Technology Vol. 4412; pp. 140 - 149
Main Authors Rahman, Sk. Md. Mizanur, Inomata, Atsuo, Okamoto, Takeshi, Mambo, Masahiro, Okamoto, Eiji
Format Book Chapter
LanguageEnglish
Published Germany Springer Berlin / Heidelberg 2007
Springer Berlin Heidelberg
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text
ISBN3540717889
9783540717881
ISSN0302-9743
1611-3349
DOI10.1007/978-3-540-71789-8_15

Cover

Abstract The main characteristic of a mobile ad-hoc network is its infrastructure-less, highly dynamic topology, which is subject to malicious traffic analysis. Malicious intermediate nodes in wireless mobile ad-hoc networks are a threat concerning security as well as anonymity of exchanged information. To protect anonymity and achieve security of nodes in mobile ad-hoc networks, an anonymous on-demand routing protocol, termed RIOMO, is proposed. For this purpose, pseudo IDs of the nodes are generated considering Pairing-based Cryptography. Nodes can generate their own pseudo IDs independently. As a result RIOMO reduces pseudo IDs maintenance costs. Only trust-worthy nodes are allowed to take part in routing to discover a route. To ensure trustiness each node has to make authentication to its neighbors through an anonymous authentication process. Thus RIOMO safely communicates between nodes without disclosing node identities; it also provides different desirable anonymous properties such as identity privacy, location privacy, route anonymity, and robustness against several attacks.
AbstractList The main characteristic of a mobile ad-hoc network is its infrastructure-less, highly dynamic topology, which is subject to malicious traffic analysis. Malicious intermediate nodes in wireless mobile ad-hoc networks are a threat concerning security as well as anonymity of exchanged information. To protect anonymity and achieve security of nodes in mobile ad-hoc networks, an anonymous on-demand routing protocol, termed RIOMO, is proposed. For this purpose, pseudo IDs of the nodes are generated considering Pairing-based Cryptography. Nodes can generate their own pseudo IDs independently. As a result RIOMO reduces pseudo IDs maintenance costs. Only trust-worthy nodes are allowed to take part in routing to discover a route. To ensure trustiness each node has to make authentication to its neighbors through an anonymous authentication process. Thus RIOMO safely communicates between nodes without disclosing node identities; it also provides different desirable anonymous properties such as identity privacy, location privacy, route anonymity, and robustness against several attacks.
Author Rahman, Sk. Md. Mizanur
Inomata, Atsuo
Okamoto, Eiji
Mambo, Masahiro
Okamoto, Takeshi
Author_xml – sequence: 1
  givenname: Sk. Md. Mizanur
  surname: Rahman
  fullname: Rahman, Sk. Md. Mizanur
  organization: Graduate School of Systems and Information Engineering, University of Tsukuiba, Japan
– sequence: 2
  givenname: Atsuo
  surname: Inomata
  fullname: Inomata, Atsuo
  organization: Japan Science and Technology Agency, Tokyo, Japan
– sequence: 3
  givenname: Takeshi
  surname: Okamoto
  fullname: Okamoto, Takeshi
  organization: Graduate School of Systems and Information Engineering, University of Tsukuiba, Japan
– sequence: 4
  givenname: Masahiro
  surname: Mambo
  fullname: Mambo, Masahiro
  organization: Graduate School of Systems and Information Engineering, University of Tsukuiba, Japan
– sequence: 5
  givenname: Eiji
  surname: Okamoto
  fullname: Okamoto, Eiji
  organization: Graduate School of Systems and Information Engineering, University of Tsukuiba, Japan
BookMark eNqNkMtOwzAQRQ0URFv6ByzyAwbb40eyrCqgSDwWgFhaSTyF0DQOcSLE3-O2SGzxZqSZOZ6rMyGjxjdIyDlnF5wxc5mZlAJVklHDTZrR1HJ1QCYQO7uGOSRjrjmnADI7-huk2YiMGTBBMyPhJC5lXOpUCnVKZiF8sPiEBqlhTObzePR744eQPGE5dJgs_GYzNFWZ95VvkqpJXqsOawwhufdFVWMyd3Tpy-QB-y_frcMZOV7ldcDZb52Sl-ur58WS3j3e3C7md7QVDBQVKy1FYQrnRO4yzmNO5ZgT4Bw4WZoSYz4lM4UpqHRV5NJIXXAsjHZYgIMpEft_Q9tVzRt2tvB-HSxndmvLRlsWbFRgd3Ls1laE5B5qO_85YOgtbqkSm77L6_I9b3vsgtUmBkqF5VpHiv8XA6bjjS2mIsbgBw8kfCw
ContentType Book Chapter
Copyright Springer Berlin Heidelberg 2007
Copyright_xml – notice: Springer Berlin Heidelberg 2007
DBID FFUUA
DEWEY 004
DOI 10.1007/978-3-540-71789-8_15
DatabaseName ProQuest Ebook Central - Book Chapters - Demo use only
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISBN 3540717897
9783540717898
EISSN 1611-3349
Editor Kim, Hyoung Joong
Kim, Seong-Don
Chae, Jong-Suk
Stajano, Frank
Editor_xml – sequence: 1
  fullname: Kim, Hyoung Joong
– sequence: 2
  fullname: Kim, Seong-Don
– sequence: 3
  fullname: Stajano, Frank
– sequence: 4
  fullname: Chae, Jong-Suk
EndPage 149
ExternalDocumentID EBC6711182_166_151
EBC3061532_165_150
GroupedDBID 089
0D6
0DA
0E8
2HV
38.
A4I
A4J
AABBV
AABFA
AAHDE
AAJYQ
AATVQ
AAUKK
ABBUY
ABBVZ
ABCYT
ABMNI
ACDTA
ACDUY
ACFGI
ADQVG
AEDXK
AEHEY
AEJLV
AEKFX
AETDV
AEZAY
AGNDD
AHMWK
AHNNE
ALMA_UNASSIGNED_HOLDINGS
ATJMZ
AZZ
BBABE
CZZ
E6I
FFUUA
IEZ
IV0
JJU
LZA
MA.
MW~
MYL
NUP
SBO
TPJZQ
TSXQS
Z7R
Z7U
Z7X
Z7Z
Z81
Z83
Z84
Z85
Z88
-DT
-GH
-~X
1SB
29L
2HA
5QI
875
AASHB
ACGFS
ADCXD
AEFIE
EJD
F5P
FEDTE
HVGLF
LAS
LDH
P2P
RNI
RSU
SVGTG
VI1
~02
ID FETCH-LOGICAL-p2035-2f642b7bdd2ad9111785d0d23dd3d4c7ce4255495e8358fba4746b1eb76deb3d3
ISBN 3540717889
9783540717881
ISSN 0302-9743
IngestDate Wed Sep 17 03:19:10 EDT 2025
Tue Oct 21 03:05:25 EDT 2025
Tue Oct 21 02:34:55 EDT 2025
IsPeerReviewed false
IsScholarly false
LCCallNum QA76.5915 -- .I32 2006eb
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-p2035-2f642b7bdd2ad9111785d0d23dd3d4c7ce4255495e8358fba4746b1eb76deb3d3
OCLC 191468425
PQID EBC3061532_165_150
PageCount 10
ParticipantIDs springer_books_10_1007_978_3_540_71789_8_15
proquest_ebookcentralchapters_6711182_166_151
proquest_ebookcentralchapters_3061532_165_150
PublicationCentury 2000
PublicationDate 2007
PublicationDateYYYYMMDD 2007-01-01
PublicationDate_xml – year: 2007
  text: 2007
PublicationDecade 2000
PublicationPlace Germany
PublicationPlace_xml – name: Germany
– name: Berlin, Heidelberg
PublicationSeriesTitle Lecture Notes in Computer Science
PublicationSeriesTitleAlternate LNCS
PublicationSubtitle First International Conference, ICUCT 2006, Jeju Island, Korea, December 5-6, 2006, Revised Selected Papers
PublicationTitle Ubiquitous Convergence Technology
PublicationYear 2007
Publisher Springer Berlin / Heidelberg
Springer Berlin Heidelberg
Publisher_xml – name: Springer Berlin / Heidelberg
– name: Springer Berlin Heidelberg
RelatedPersons Kleinberg, Jon M.
Mattern, Friedemann
Nierstrasz, Oscar
Steffen, Bernhard
Kittler, Josef
Vardi, Moshe Y.
Weikum, Gerhard
Sudan, Madhu
Naor, Moni
Mitchell, John C.
Terzopoulos, Demetri
Kanade, Takeo
Rangan, C. Pandu
Hutchison, David
Tygar, Doug
RelatedPersons_xml – sequence: 1
  givenname: David
  surname: Hutchison
  fullname: Hutchison, David
– sequence: 2
  givenname: Takeo
  surname: Kanade
  fullname: Kanade, Takeo
– sequence: 3
  givenname: Josef
  surname: Kittler
  fullname: Kittler, Josef
– sequence: 4
  givenname: Jon M.
  surname: Kleinberg
  fullname: Kleinberg, Jon M.
– sequence: 5
  givenname: Friedemann
  surname: Mattern
  fullname: Mattern, Friedemann
– sequence: 6
  givenname: John C.
  surname: Mitchell
  fullname: Mitchell, John C.
– sequence: 7
  givenname: Moni
  surname: Naor
  fullname: Naor, Moni
– sequence: 8
  givenname: Oscar
  surname: Nierstrasz
  fullname: Nierstrasz, Oscar
– sequence: 9
  givenname: C. Pandu
  surname: Rangan
  fullname: Rangan, C. Pandu
– sequence: 10
  givenname: Bernhard
  surname: Steffen
  fullname: Steffen, Bernhard
– sequence: 11
  givenname: Madhu
  surname: Sudan
  fullname: Sudan, Madhu
– sequence: 12
  givenname: Demetri
  surname: Terzopoulos
  fullname: Terzopoulos, Demetri
– sequence: 13
  givenname: Doug
  surname: Tygar
  fullname: Tygar, Doug
– sequence: 14
  givenname: Moshe Y.
  surname: Vardi
  fullname: Vardi, Moshe Y.
– sequence: 15
  givenname: Gerhard
  surname: Weikum
  fullname: Weikum, Gerhard
SSID ssj0000263463
ssj0002792
Score 1.337568
Snippet The main characteristic of a mobile ad-hoc network is its infrastructure-less, highly dynamic topology, which is subject to malicious traffic analysis....
SourceID springer
proquest
SourceType Publisher
StartPage 140
SubjectTerms Ad-hoc network
Anonymity
Pairing-Based Cryptography
Routing
Security
Title Anonymous Secure Communication in Wireless Mobile Ad-Hoc Networks
URI http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=3061532&ppg=150
http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=6711182&ppg=151
http://link.springer.com/10.1007/978-3-540-71789-8_15
Volume 4412
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3fS8MwEA5uIqgP6lT8TR58GxHTdE37OGUyRH1S2VtomgwE2aZuPvjXe9ekda0DmS-llGMc-brr3SXfd4Sc80ybMBGaWc4NC6PYsiTVAQtQXwlSijgdIjn5_iHqP4W3g87gZ7xlzi6Z6ovsayGv5D-owjPAFVmySyBb_ig8gHvAF66AMFxryW-1zeomFumXtxn8H2f51M1Px6K0v3rlhU6yr_Jdgx1n1c0RQ7DpgcdgXzHs3Y81RIp217D-OENCMB7dqnYHZK07UHQH2148C6XQFwlo-QYQ1Haxm6DyK7LWD1OgacJi5ciYVSFr7rRka0LWvatrgQmUCBSPOgqNJm8M53_hPrkfhtIgDXClSVa7vdu757JbBpWiCCPhyTm5m8la2bdybs8RIxe5WSkharveeTLxuE02kWBCkfkBju-QFTtqka1ivAb10bZFNua0IndJt4SQOghpBUL6MqIFhNRBSB2EtIBwjzzd9B6v-8zPv2CTAJVEgyEUh1pqY4LU4EdJxh1zaQJhjDBhJjMLARfq-46FVYiHOg1lGGlutYyM1cKIfdIE1-wBoRDIY50MJTcyDYXRCU9j1Iy_TALDNU8PCSsWR-W79P5ocOaW4kPVkPvTPpIcS1ewj8CeH5J2seIKzT9UIZcNUCmhACqVQ6UQqqMlvTkm6z_v_glpTt9n9hRyxak-8y_SN0sQZO0
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Ubiquitous+Convergence+Technology&rft.atitle=Anonymous+Secure+Communication+in+Wireless+Mobile+Ad-Hoc+Networks&rft.date=2007-01-01&rft.pub=Springer+Berlin+%2F+Heidelberg&rft.isbn=9783540717881&rft_id=info:doi/10.1007%2F978-3-540-71789-8_15&rft.externalDBID=150&rft.externalDocID=EBC3061532_165_150
thumbnail_s http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F3061532-l.jpg
http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F6711182-l.jpg