Security Enhancement of First Mile Wireless Access with Optimal QoS through Anonymity in Convergence Network

作者: Dananjayan P , Shankar R

DOI:

关键词:

摘要: The first mile wireless access of convergence networks is prone to various attacks due the broadcasting feature transmission. Most existing security measures focus on protection message contents, leaving header part in plain text. Therefore, that has source and destination address, when transmitted text, can reveal information be useful for traffic analysis attack. In this paper, a master node generates pseudonym sets slave nodes by using Unique Pair Sequence (UPS), assigns each set itself. assigned are all nodes. Each uses an address randomly picked from as while transmitting message, avoiding For integrity instead allocating separate bits Message Authentication Code (MAC) frame, selected set, depending value generated hash-keyed function, called Address Embedded (AMAC) followed. Since AMAC does function MAC includes it used transmit anonymously well authenticate message. AMAC, anonymous scheme where additional avoided compared with results obtained simulating scenarios ZIGBEE WiMax OPNET 14.5. simulation show performs better than terms QoS metrics also.

参考文章(13)
K. El-Khatib, L. Korba, R. Song, G. Yee, Secure dynamic distributed routing algorithm for ad hoc wireless networks international conference on parallel processing. pp. 359- 366 ,(2003) , 10.1109/ICPPW.2003.1240390
Min-Ho Park, Seung-Woo Seo, A Pseudonym Assignment for the Last Mile Wireless Access to 4G Networks global communications conference. pp. 1- 6 ,(2007) , 10.1109/GLOCOMW.2007.4437782
Kin Choong Yow, Amol Dabholkar, A LIGHT-WEIGHT MUTUAL AUTHENTICATION AND KEY-EXCHANGE PROTOCOL BASED ON ELLIPTICAL CURVE CRYPTOGAPHY FOR ENERGY-CONSTRAINED DEVICES International Journal of Network Security & Its Applications. ,vol. 2, pp. 123- 132 ,(2010) , 10.5121/IJNSA.2010.2210
Oliver Berthold, Hannes Federrath, Marit Köhntopp, Project “anonymity and unobservability in the Internet” Proceedings of the tenth conference on Computers, freedom and privacy challenging the assumptions - CFP '00. pp. 57- 65 ,(2000) , 10.1145/332186.332211
Clay Shields, Brian Neil Levine, A protocol for anonymous communication over the Internet computer and communications security. pp. 33- 42 ,(2000) , 10.1145/352600.352607
Ronggong Song, Larry Korba, George Yee, AnonDSR Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks - SASN '05. pp. 33- 42 ,(2005) , 10.1145/1102219.1102226
P. Kamat, Yanyong Zhang, W. Trappe, C. Ozturk, Enhancing Source-Location Privacy in Sensor Network Routing international conference on distributed computing systems. ,vol. 1, pp. 599- 608 ,(2005) , 10.1109/ICDCS.2005.31
F. Armknecht, J. Girao, A. Matos, R. L. Aguiar, Who Said That? Privacy at Link Layer ieee international conference computer and communications. pp. 2521- 2525 ,(2007) , 10.1109/INFCOM.2007.313
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry Korba, SDAR: a secure distributed anonymous routing protocol for wireless and mobile ad hoc networks local computer networks. pp. 618- 624 ,(2004) , 10.1109/LCN.2004.109
Jiejun Kong, Xiaoyan Hong, ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks mobile ad hoc networking and computing. pp. 291- 302 ,(2003) , 10.1145/778415.778449