Anonymous Authentication Protocol in Mobile Ad hoc Networks

作者: Sheng Ming

DOI:

关键词:

摘要: A new anonymous authentication protocol is proposed For Mobile Ad Hoc Networks, the main purpose to provide true identity of a hidden node communication mechanism and improve resilience against malicious attacks. The end-to-end conducted in three-pass handshake based on an asymmetric symmetric key cryptography. After successfully finished phase secure multiple data channels are established. anonymity guarantied by randomly chosen pseudonyms owned user. Nodes network publicly identified independent users' pseudonyms. article described model process implementation protocol, its security analyzed brief.

参考文章(15)
M. Rennhard, S. Rafaeli, L. Mathy, B. Plattner, D. Hutchison, An architecture for an anonymity network workshops on enabling technologies infrastracture for collaborative enterprises. pp. 165- 170 ,(2001) , 10.1109/ENABL.2001.953408
Yih-Chun Hu, Adrian Perrig, David B. Johnson, Ariadne: Proceedings of the 8th annual international conference on Mobile computing and networking - MobiCom '02. pp. 12- 23 ,(2002) , 10.1145/570645.570648
Charles E Perkins, Elizabeth M Royer, Ad-hoc on-demand distance vector routing workshop on mobile computing systems and applications. pp. 90- 100 ,(1999) , 10.1109/MCSA.1999.749281
David L. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms Communications of The ACM. ,vol. 24, pp. 84- 90 ,(1981) , 10.1145/358549.358563
Sonja Buchegger, Jean-Yves Le Boudec, Performance analysis of the CONFIDANT protocol Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing - MobiHoc '02. pp. 226- 236 ,(2002) , 10.1145/513800.513828
S. Capkun, L. Buttyan, J. Hubaux, Self-organized public-key management for mobile ad hoc networks IEEE Transactions on Mobile Computing. ,vol. 2, pp. 52- 64 ,(2003) , 10.1109/TMC.2003.1195151
Manel Guerrero Zapata, N. Asokan, Securing ad hoc routing protocols Proceedings of the ACM workshop on Wireless security - WiSE '02. pp. 1- 10 ,(2002) , 10.1145/570681.570682
A. Perrig, R. Canetti, J.D. Tygar, Dawn Song, Efficient authentication and signing of multicast streams over lossy channels ieee symposium on security and privacy. pp. 56- 73 ,(2000) , 10.1109/SECPRI.2000.848446
Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, Clay Shields, Elizabeth M Belding-Royer, A secure routing protocol for ad hoc networks international conference on network protocols. pp. 78- 89 ,(2002) , 10.1109/ICNP.2002.1181388
S. Buchegger, J.-Y. Le Boudec, Self-policing mobile ad hoc networks by reputation systems IEEE Communications Magazine. ,vol. 43, pp. 101- 107 ,(2005) , 10.1109/MCOM.2005.1470831