Anonymous Secure Communication in Wireless Mobile Ad-Hoc Networks
The main characteristic of a mobile ad-hoc network is its infrastructure-less, highly dynamic topology, which is subject to malicious traffic analysis. Malicious intermediate nodes in wireless mobile ad-hoc networks are a threat concerning security as well as anonymity of exchanged information. To p...
Saved in:
| Published in | Ubiquitous Convergence Technology Vol. 4412; pp. 140 - 149 |
|---|---|
| Main Authors | , , , , |
| Format | Book Chapter |
| Language | English |
| Published |
Germany
Springer Berlin / Heidelberg
2007
Springer Berlin Heidelberg |
| Series | Lecture Notes in Computer Science |
| Subjects | |
| Online Access | Get full text |
| ISBN | 3540717889 9783540717881 |
| ISSN | 0302-9743 1611-3349 |
| DOI | 10.1007/978-3-540-71789-8_15 |
Cover
| Abstract | The main characteristic of a mobile ad-hoc network is its infrastructure-less, highly dynamic topology, which is subject to malicious traffic analysis. Malicious intermediate nodes in wireless mobile ad-hoc networks are a threat concerning security as well as anonymity of exchanged information. To protect anonymity and achieve security of nodes in mobile ad-hoc networks, an anonymous on-demand routing protocol, termed RIOMO, is proposed. For this purpose, pseudo IDs of the nodes are generated considering Pairing-based Cryptography. Nodes can generate their own pseudo IDs independently. As a result RIOMO reduces pseudo IDs maintenance costs. Only trust-worthy nodes are allowed to take part in routing to discover a route. To ensure trustiness each node has to make authentication to its neighbors through an anonymous authentication process. Thus RIOMO safely communicates between nodes without disclosing node identities; it also provides different desirable anonymous properties such as identity privacy, location privacy, route anonymity, and robustness against several attacks. |
|---|---|
| AbstractList | The main characteristic of a mobile ad-hoc network is its infrastructure-less, highly dynamic topology, which is subject to malicious traffic analysis. Malicious intermediate nodes in wireless mobile ad-hoc networks are a threat concerning security as well as anonymity of exchanged information. To protect anonymity and achieve security of nodes in mobile ad-hoc networks, an anonymous on-demand routing protocol, termed RIOMO, is proposed. For this purpose, pseudo IDs of the nodes are generated considering Pairing-based Cryptography. Nodes can generate their own pseudo IDs independently. As a result RIOMO reduces pseudo IDs maintenance costs. Only trust-worthy nodes are allowed to take part in routing to discover a route. To ensure trustiness each node has to make authentication to its neighbors through an anonymous authentication process. Thus RIOMO safely communicates between nodes without disclosing node identities; it also provides different desirable anonymous properties such as identity privacy, location privacy, route anonymity, and robustness against several attacks. |
| Author | Rahman, Sk. Md. Mizanur Inomata, Atsuo Okamoto, Eiji Mambo, Masahiro Okamoto, Takeshi |
| Author_xml | – sequence: 1 givenname: Sk. Md. Mizanur surname: Rahman fullname: Rahman, Sk. Md. Mizanur organization: Graduate School of Systems and Information Engineering, University of Tsukuiba, Japan – sequence: 2 givenname: Atsuo surname: Inomata fullname: Inomata, Atsuo organization: Japan Science and Technology Agency, Tokyo, Japan – sequence: 3 givenname: Takeshi surname: Okamoto fullname: Okamoto, Takeshi organization: Graduate School of Systems and Information Engineering, University of Tsukuiba, Japan – sequence: 4 givenname: Masahiro surname: Mambo fullname: Mambo, Masahiro organization: Graduate School of Systems and Information Engineering, University of Tsukuiba, Japan – sequence: 5 givenname: Eiji surname: Okamoto fullname: Okamoto, Eiji organization: Graduate School of Systems and Information Engineering, University of Tsukuiba, Japan |
| BookMark | eNqNkMtOwzAQRQ0URFv6ByzyAwbb40eyrCqgSDwWgFhaSTyF0DQOcSLE3-O2SGzxZqSZOZ6rMyGjxjdIyDlnF5wxc5mZlAJVklHDTZrR1HJ1QCYQO7uGOSRjrjmnADI7-huk2YiMGTBBMyPhJC5lXOpUCnVKZiF8sPiEBqlhTObzePR744eQPGE5dJgs_GYzNFWZ95VvkqpJXqsOawwhufdFVWMyd3Tpy-QB-y_frcMZOV7ldcDZb52Sl-ur58WS3j3e3C7md7QVDBQVKy1FYQrnRO4yzmNO5ZgT4Bw4WZoSYz4lM4UpqHRV5NJIXXAsjHZYgIMpEft_Q9tVzRt2tvB-HSxndmvLRlsWbFRgd3Ls1laE5B5qO_85YOgtbqkSm77L6_I9b3vsgtUmBkqF5VpHiv8XA6bjjS2mIsbgBw8kfCw |
| ContentType | Book Chapter |
| Copyright | Springer Berlin Heidelberg 2007 |
| Copyright_xml | – notice: Springer Berlin Heidelberg 2007 |
| DBID | FFUUA |
| DEWEY | 004 |
| DOI | 10.1007/978-3-540-71789-8_15 |
| DatabaseName | ProQuest Ebook Central - Book Chapters - Demo use only |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Computer Science |
| EISBN | 3540717897 9783540717898 |
| EISSN | 1611-3349 |
| Editor | Kim, Hyoung Joong Kim, Seong-Don Chae, Jong-Suk Stajano, Frank |
| Editor_xml | – sequence: 1 fullname: Kim, Hyoung Joong – sequence: 2 fullname: Kim, Seong-Don – sequence: 3 fullname: Stajano, Frank – sequence: 4 fullname: Chae, Jong-Suk |
| EndPage | 149 |
| ExternalDocumentID | EBC6711182_166_151 EBC3061532_165_150 |
| GroupedDBID | 089 0D6 0DA 0E8 2HV 38. A4I A4J AABBV AABFA AAHDE AAJYQ AATVQ AAUKK ABBUY ABBVZ ABCYT ABMNI ACDTA ACDUY ACFGI ADQVG AEDXK AEHEY AEJLV AEKFX AETDV AEZAY AGNDD AHMWK AHNNE ALMA_UNASSIGNED_HOLDINGS ATJMZ AZZ BBABE CZZ E6I FFUUA IEZ IV0 JJU LZA MA. MW~ MYL NUP SBO TPJZQ TSXQS Z7R Z7U Z7X Z7Z Z81 Z83 Z84 Z85 Z88 -DT -GH -~X 1SB 29L 2HA 5QI 875 AASHB ACGFS ADCXD AEFIE EJD F5P FEDTE HVGLF LAS LDH P2P RNI RSU SVGTG VI1 ~02 |
| ID | FETCH-LOGICAL-p2035-2f642b7bdd2ad9111785d0d23dd3d4c7ce4255495e8358fba4746b1eb76deb3d3 |
| ISBN | 3540717889 9783540717881 |
| ISSN | 0302-9743 |
| IngestDate | Wed Sep 17 03:19:10 EDT 2025 Tue Oct 21 03:05:25 EDT 2025 Tue Oct 21 02:34:55 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| LCCallNum | QA76.5915 -- .I32 2006eb |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-p2035-2f642b7bdd2ad9111785d0d23dd3d4c7ce4255495e8358fba4746b1eb76deb3d3 |
| OCLC | 191468425 |
| PQID | EBC3061532_165_150 |
| PageCount | 10 |
| ParticipantIDs | springer_books_10_1007_978_3_540_71789_8_15 proquest_ebookcentralchapters_6711182_166_151 proquest_ebookcentralchapters_3061532_165_150 |
| PublicationCentury | 2000 |
| PublicationDate | 2007 |
| PublicationDateYYYYMMDD | 2007-01-01 |
| PublicationDate_xml | – year: 2007 text: 2007 |
| PublicationDecade | 2000 |
| PublicationPlace | Germany |
| PublicationPlace_xml | – name: Germany – name: Berlin, Heidelberg |
| PublicationSeriesTitle | Lecture Notes in Computer Science |
| PublicationSeriesTitleAlternate | LNCS |
| PublicationSubtitle | First International Conference, ICUCT 2006, Jeju Island, Korea, December 5-6, 2006, Revised Selected Papers |
| PublicationTitle | Ubiquitous Convergence Technology |
| PublicationYear | 2007 |
| Publisher | Springer Berlin / Heidelberg Springer Berlin Heidelberg |
| Publisher_xml | – name: Springer Berlin / Heidelberg – name: Springer Berlin Heidelberg |
| RelatedPersons | Kleinberg, Jon M. Mattern, Friedemann Nierstrasz, Oscar Steffen, Bernhard Kittler, Josef Vardi, Moshe Y. Weikum, Gerhard Sudan, Madhu Naor, Moni Mitchell, John C. Terzopoulos, Demetri Kanade, Takeo Rangan, C. Pandu Hutchison, David Tygar, Doug |
| RelatedPersons_xml | – sequence: 1 givenname: David surname: Hutchison fullname: Hutchison, David – sequence: 2 givenname: Takeo surname: Kanade fullname: Kanade, Takeo – sequence: 3 givenname: Josef surname: Kittler fullname: Kittler, Josef – sequence: 4 givenname: Jon M. surname: Kleinberg fullname: Kleinberg, Jon M. – sequence: 5 givenname: Friedemann surname: Mattern fullname: Mattern, Friedemann – sequence: 6 givenname: John C. surname: Mitchell fullname: Mitchell, John C. – sequence: 7 givenname: Moni surname: Naor fullname: Naor, Moni – sequence: 8 givenname: Oscar surname: Nierstrasz fullname: Nierstrasz, Oscar – sequence: 9 givenname: C. Pandu surname: Rangan fullname: Rangan, C. Pandu – sequence: 10 givenname: Bernhard surname: Steffen fullname: Steffen, Bernhard – sequence: 11 givenname: Madhu surname: Sudan fullname: Sudan, Madhu – sequence: 12 givenname: Demetri surname: Terzopoulos fullname: Terzopoulos, Demetri – sequence: 13 givenname: Doug surname: Tygar fullname: Tygar, Doug – sequence: 14 givenname: Moshe Y. surname: Vardi fullname: Vardi, Moshe Y. – sequence: 15 givenname: Gerhard surname: Weikum fullname: Weikum, Gerhard |
| SSID | ssj0000263463 ssj0002792 |
| Score | 1.337568 |
| Snippet | The main characteristic of a mobile ad-hoc network is its infrastructure-less, highly dynamic topology, which is subject to malicious traffic analysis.... |
| SourceID | springer proquest |
| SourceType | Publisher |
| StartPage | 140 |
| SubjectTerms | Ad-hoc network Anonymity Pairing-Based Cryptography Routing Security |
| Title | Anonymous Secure Communication in Wireless Mobile Ad-Hoc Networks |
| URI | http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=3061532&ppg=150 http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=6711182&ppg=151 http://link.springer.com/10.1007/978-3-540-71789-8_15 |
| Volume | 4412 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3fS8MwEA5uIqgP6lT8TR58GxHTdE37OGUyRH1S2VtomgwE2aZuPvjXe9ekda0DmS-llGMc-brr3SXfd4Sc80ybMBGaWc4NC6PYsiTVAQtQXwlSijgdIjn5_iHqP4W3g87gZ7xlzi6Z6ovsayGv5D-owjPAFVmySyBb_ig8gHvAF66AMFxryW-1zeomFumXtxn8H2f51M1Px6K0v3rlhU6yr_Jdgx1n1c0RQ7DpgcdgXzHs3Y81RIp217D-OENCMB7dqnYHZK07UHQH2148C6XQFwlo-QYQ1Haxm6DyK7LWD1OgacJi5ciYVSFr7rRka0LWvatrgQmUCBSPOgqNJm8M53_hPrkfhtIgDXClSVa7vdu757JbBpWiCCPhyTm5m8la2bdybs8RIxe5WSkharveeTLxuE02kWBCkfkBju-QFTtqka1ivAb10bZFNua0IndJt4SQOghpBUL6MqIFhNRBSB2EtIBwjzzd9B6v-8zPv2CTAJVEgyEUh1pqY4LU4EdJxh1zaQJhjDBhJjMLARfq-46FVYiHOg1lGGlutYyM1cKIfdIE1-wBoRDIY50MJTcyDYXRCU9j1Iy_TALDNU8PCSsWR-W79P5ocOaW4kPVkPvTPpIcS1ewj8CeH5J2seIKzT9UIZcNUCmhACqVQ6UQqqMlvTkm6z_v_glpTt9n9hRyxak-8y_SN0sQZO0 |
| linkProvider | Library Specific Holdings |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Ubiquitous+Convergence+Technology&rft.atitle=Anonymous+Secure+Communication+in+Wireless+Mobile+Ad-Hoc+Networks&rft.date=2007-01-01&rft.pub=Springer+Berlin+%2F+Heidelberg&rft.isbn=9783540717881&rft_id=info:doi/10.1007%2F978-3-540-71789-8_15&rft.externalDBID=150&rft.externalDocID=EBC3061532_165_150 |
| thumbnail_s | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F3061532-l.jpg http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F6711182-l.jpg |