Anonymizing Geographic Routing for Preserving Location Privacy Using Unlinkability and Unobservability

نویسندگان

  • K. G. S. Venkatesan R. Resmi
  • R. Remya
چکیده

Privacy-preserving routing is crucial for some Ad Hoc networks that require stronger privacy protection. A number of schemes have been proposed to protect privacy in Ad Hoc networks. However, none of these schemes offer complete unlinkability or unobservability property since data packets and control packets are still linkable and distinguishable in these schemes. In this project, Define stronger privacy requirements regarding privacy-preserving routing in mobile Ad Hoc networks. In order to provide location authentication and location privacy simultaneously. In these packets, they are identified by pseudonyms which are generated from random nonces and secret session keys. The nonces are only used once and never reused, and so are the pseudonyms. Except the random nonce and the pseudonym, the remaining part of the message, including the trapdoor information in the route request, is decrypted and encrypted at each hop. Hence even for a global adversary who can eavesdrop every transmission within the network, it is impossible for him to find linkage between messages without knowing any encryption key. Protocol also authenticates the routing paths taken by individual messages. Achieving anonymity is a different problem than achieving data confidentiality. While data can be protected by cryptographic means, the recipient node address (and maybe the sender node address) of a packet cannot be simply encrypted because they are needed by the network to

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Anonymizing Geographic Ad Hoc Routing for Preserving Location Privacy

Due to the utilization of location information, geographic ad hoc routing presents superiority in scalability compared with traditional topology-based routing in mobile ad hoc networks. However, the consequent solicitation for location presence incurs severe concerns of location privacy, which has not been properly studied. In this paper, we attempt to preserve location privacy based on the ide...

متن کامل

Performance of Comparison between AODV and Secured Protocol

In mobile ad hoc networks packets are relayed over multiple hops to reach their destination. Due to the features of open medium, dynamic topology, cooperative algorithms, lack of centralized monitoring and management point mobile ad-hoc networks are much more vulnerable to security attacks when compared to the wired networks. A number of secure routing schemes have been brought forward. However...

متن کامل

Effective Anonymous Imperceptible Secure Re-active Routing (isrr) Protocol for Manet

In wireless networks, to provide the privacy protection is a hard one than wired networks. Many protocols in the network use the encryption and decryption technique to transfer the data in a secure way. In wired network, it doesn’t need to consider the mobility of the node. But in wireless network it needs to keep the mobility information in the protected way. To give a privacy protection in th...

متن کامل

Secure Key Sharing in Mobile Ad hoc Network using Content Invisibility Scheme

In mobile ad hoc network (MANET) privacy protection and efficient use of memory is a challenging task due to mobile and dynamic behavior. Existing schemes provides anonymity, unlinkability and unobservability, but they consume more memory space and also result in computation overhead and communication delay. In our proposed scheme, key is established only between neighbors, which reduce memory ...

متن کامل

Addressing Privacy: Matching User Requirements with Implementation Techniques

-The paper considers the basic privacy requirements namely anonymity, pseudonimity, unlinkability and unobservability and how these requirements can be linked with related system implementation techniques thus guiding design decisions during system development.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014