A Destination-Initiated Mix Route Algorithm in MANET

作者: Pooja Sharma , Smriti Babbar

DOI:

关键词:

摘要: Traditionally, encryption has played an important role in network security. However, it is a misconception that to secure network, one only needs encrypt the traffic. Encryption protects communication partners from disclosure of their secret messages but cannot prevent traffic analysis and leakage information about who communicates with whom. In presence collaborating adversaries, becomes very easier for them reveal relations can danger anonymity. reliably providing anonymity crucial many applications. this paper,we explore design MIX- net based system mobile ad hoc works. We focus on hiding source-destination relationship respect each connection. survey existing MIX route determination algorithms do not account dynamic topology changes, which may result high packet loss rate large latency. then introduce adaptive overcome problem. First Closest Algorithm End-to-End Connection another Destination-Initiated Route (DIMR) algorithm.

参考文章(7)
A. Fasbender, D. Kesdogan, O. Kubitz, Variable and scalable security: protection of location information in mobile IP vehicular technology conference. ,vol. 2, pp. 963- 967 ,(1996) , 10.1109/VETEC.1996.501454
C. Gulcu, G. Tsudik, Mixing E-mail with Babel network and distributed system security symposium. pp. 2- 16 ,(1996) , 10.1109/NDSS.1996.492350
Michael K. Reiter, Aviel D. Rubin, Crowds: anonymity for Web transactions ACM Transactions on Information and System Security. ,vol. 1, pp. 66- 92 ,(1998) , 10.1145/290163.290168
Marc Rennhard, Bernhard Plattner, Introducing MorphMix Proceeding of the ACM workshop on Privacy in the Electronic Society - WPES '02. pp. 91- 102 ,(2002) , 10.1145/644527.644537
Ye Zhu, Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao, On flow correlation attacks and countermeasures in mix networks privacy enhancing technologies. pp. 207- 225 ,(2004) , 10.1007/11423409_13
David B. Johnson, David A. Maltz, Dynamic Source Routing in Ad Hoc Wireless Networks Mobile Computing. pp. 153- 181 ,(1996) , 10.1007/978-0-585-29603-6_5
Stefano Basagni, Emilia Rosti, Danilo Bruschi, Kris Herrin, Secure pebblenets mobile ad hoc networking and computing. pp. 156- 163 ,(2001) , 10.1145/501436.501438