Group-Based Anonymous On-Demand Routing Protocol for Resource-Restricted Mobile Ad Hoc Networks

作者: George Moldovan , Anda Ignat , Martin Gergeleit

DOI: 10.1007/978-3-642-39247-4_17

关键词:

摘要: As the number of applications and support for ad hoc networks increases, so does role manufacturer heterogeneity nodes. This creates a valid concern network security, privacy efficiency. We propose as solution group-based anonymous routing protocol targeting low resource networks, where groups could contain nodes with similar hardware or trust levels. Distinctive features are overlapping groups, possibility sender restricting route to destination one more existence node revocation mechanism. To achieve this, two main primitives utilized: secret handshakes key-agreement from pairing-based cryptography private set intersection pre-distributed keys. analyze effects varying group size on connectivity, average length privacy. validate protocol’s efficiency, we measure its performance resource-restricted TelosB motes.

参考文章(19)
Jeffrey Shallit, Eric Bach, Algorithmic number theory MIT Press. ,(1996)
Steven D. Galbraith, Keith Harrison, David Soldera, Implementing the Tate Pairing algorithmic number theory symposium. pp. 324- 337 ,(2002) , 10.1007/3-540-45455-1_26
Christian Bettstetter, Christian Wagner, The Spatial Node Distribution of the Random Waypoint Mobility Model Mobile Ad-Hoc Netzwerke, 1. deutscher Workshop über Mobile Ad-Hoc Netzwerke WMAN 2002. pp. 41- 58 ,(2002)
Alfred J Menezes, Paul C van Oorschot, Scott A Vanstone, Handbook of Applied Cryptography ,(1996)
C. Bettstetter, On the Connectivity of Ad Hoc Networks The Computer Journal. ,vol. 47, pp. 432- 447 ,(2004) , 10.1093/COMJNL/47.4.432
Dan Boneh, Matthew Franklin, Identity-Based Encryption from the Weil Pairing SIAM Journal on Computing. ,vol. 32, pp. 586- 615 ,(2003) , 10.1137/S0097539701398521
Charles E Perkins, Elizabeth M Royer, Ad-hoc on-demand distance vector routing workshop on mobile computing systems and applications. pp. 90- 100 ,(1999) , 10.1109/MCSA.1999.749281
David L. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms Communications of The ACM. ,vol. 24, pp. 84- 90 ,(1981) , 10.1145/358549.358563
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang, MASK: anonymous on-demand routing in mobile ad hoc networks IEEE Transactions on Wireless Communications. ,vol. 5, pp. 2376- 2385 ,(2006) , 10.1109/TWC.2006.1687761
Joseph Polastre, David Culler, Robert Szewczyk, Telos: enabling ultra-low power wireless research information processing in sensor networks. pp. 48- ,(2005) , 10.5555/1147685.1147744