A Pseudonym Assignment for the Last Mile Wireless Access to 4G Networks

作者: Min-Ho Park , Seung-Woo Seo

DOI: 10.1109/GLOCOMW.2007.4437782

关键词: Computer securityBroadcasting (networking)Node (networking)Traffic analysisPseudonymityComputer scienceComputer networkHeaderAnonymityPseudonymWireless

摘要: The last mile wireless access to 4G networks is inherently vulnerable various attacks due broadcasting feature of transmission. Although most communication systems provide the security measures, they focus on protection contents a message. Therefore, header part each message including source and destination addresses transmitted in plain-text format, which can reveal information that useful an attacker. In this paper, we solve loss anonymity through novel pseudonym assignment scheme. Specifically, master node generates sets for slave nodes by using Unique Pair Sequence (UPS) first devised, assigns them node. Since every randomly uses one pseudonyms set as ID whenever it transmits message, our scheme prevent attacker from attempting traffic analysis attack.

参考文章(11)
K. El-Khatib, L. Korba, R. Song, G. Yee, Secure dynamic distributed routing algorithm for ad hoc wireless networks international conference on parallel processing. pp. 359- 366 ,(2003) , 10.1109/ICPPW.2003.1240390
Michael K. Reiter, Aviel D. Rubin, Crowds: anonymity for Web transactions ACM Transactions on Information and System Security. ,vol. 1, pp. 66- 92 ,(1998) , 10.1145/290163.290168
R. L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems Communications of the ACM. ,vol. 26, pp. 96- 99 ,(1983) , 10.1145/357980.358017
Oliver Berthold, Hannes Federrath, Marit Köhntopp, Project “anonymity and unobservability in the Internet” Proceedings of the tenth conference on Computers, freedom and privacy challenging the assumptions - CFP '00. pp. 57- 65 ,(2000) , 10.1145/332186.332211
Ronggong Song, Larry Korba, George Yee, AnonDSR Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks - SASN '05. pp. 33- 42 ,(2005) , 10.1145/1102219.1102226
David L. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms Communications of The ACM. ,vol. 24, pp. 84- 90 ,(1981) , 10.1145/358549.358563
Dogan Kesdogan, Jan Egner, Roland Büschkes, Stop-and-Go-MIXes Providing Probabilistic Anonymity in an Open System information hiding. pp. 83- 98 ,(1998) , 10.1007/3-540-49380-8_7
F. Armknecht, J. Girao, A. Matos, R. L. Aguiar, Who Said That? Privacy at Link Layer ieee international conference computer and communications. pp. 2521- 2525 ,(2007) , 10.1109/INFCOM.2007.313
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry Korba, SDAR: a secure distributed anonymous routing protocol for wireless and mobile ad hoc networks local computer networks. pp. 618- 624 ,(2004) , 10.1109/LCN.2004.109
Jiejun Kong, Xiaoyan Hong, ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks mobile ad hoc networking and computing. pp. 291- 302 ,(2003) , 10.1145/778415.778449