A secure anonymous routing protocol with authenticated key exchange for ad hoc networks

نویسندگان

  • Rongxing Lu
  • Zhenfu Cao
  • Licheng Wang
  • Congkai Sun
چکیده

Anonymity and authenticated key exchange should be paid much more attention in secure mobile ad hoc routing protocols, especially in privacy-vital environment. However, as far as we know, few papers on secure routing protocols have addressed both the anonymity and authenticated key exchange. Therefore, in this paper, we present a new secure anonymous routing protocol with authenticated key exchange for ad hoc networks. In comparison with other previous secure routing protocols, our proposed protocol not only provides the anonymity to the route from the source to the destination, but also integrates the authenticated key exchange into the routing algorithm. © 2006 Elsevier B.V. All rights reserved.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security in Wireless Ad Hoc Networks

An ad hoc network is a collection of wireless nodes that dynamically form a temporary network and operates without the use of existing network infrastructure. In the near future, many personal electronic devices will be able to communicate with each other over a short-range wireless channel. We investigate the principal security issues for such an environment. The traditional way of protecting ...

متن کامل

Self - Reconfigurable Secure Routing Method with AOMDV Protocol

Secret communications are important for many applications in mobile ad hoc networks. AASR (Authenticated Anonymous Secure Routing) protocol is mainly used to defend the attacks in Mobile ad hoc network. In our studies, the route request packets are authenticated by using Onion routing and group signature. Onion routing with the route secret key authentication message is also used which defends ...

متن کامل

Secure Routing Protocol: Affection on MANETs Performance

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

متن کامل

Collaborative Trust - based Secure Routing based Ad - hoc Routing Protocol

The current existing Authenticated Routing for Ad Hoc Networks (ARAN) secure routing protocol is capable of defending itself against most malicious nodes and their different attacks. However, ARAN is not capable of defending itself against any authenticated selfish node participating in the network. Therefore, the objective of my thesis is to make the Authenticated Routing for Ad Hoc Networks s...

متن کامل

Enhanced Onion Routing Framework for MANETs

The mobile ad hoc networks (MANETs) is wireless and dynamic topology network medium, which may suffer from many open security criticism. The major issue of mobile ad hoc networks (MANETs) is to send the data in secure manner from source to destination node in adversarial (opponent) environment such wireless node communication issues are node traffic, node attack and data accessing of intermedia...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Computer Standards & Interfaces

دوره 29  شماره 

صفحات  -

تاریخ انتشار 2007