The dining cryptographers problem: unconditional sender and recipient untraceability
Journal of Cryptology
SOSP '89 Proceedings of the twelfth ACM symposium on Operating systems principles
Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers
SIGCOMM '94 Proceedings of the conference on Communications architectures, protocols and applications
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Security-aware ad hoc routing for wireless networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
A Secure Routing Protocol for Ad Hoc Networks
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
ACSAC '96 Proceedings of the 12th Annual Computer Security Applications Conference
Strategies for enhancing routing security in protocols for mobile ad hoc networks
Journal of Parallel and Distributed Computing - Special issue on Routing in mobile and wireless ad hoc networks
Securing Distance-Vector Routing Protocols
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
Location verification and trust management for resilient geographic routing
Journal of Parallel and Distributed Computing
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Performance Evaluation - Performance modelling and evaluation of wireless ad hoc and sensor networks
A wireless intrusion detection system for secure clustering and routing in ad hoc networks
ISC'06 Proceedings of the 9th international conference on Information Security
IEEE Network: The Magazine of Global Internetworking
An attack and repair of secure web transaction protocol for anonymous mobile agents
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
Hi-index | 0.00 |
In ad hoc networks, a collection of wireless hosts cooperates to transmit packets to each other, even if they are beyond their direct wireless transmission range. Recently, many proposed routing protocols provide routing services for ad hoc networks. In addition, significant attention has been devoted to developing secure and anonymous routing protocols against a variety of possible attacks. In such an environment, malicious nodes will jeopardize the security of wireless ad hoc networks if the issues of secure data exchange are not properly handled. In this paper, we discuss the mobile agent technique and then propose a novel solution for secure and anonymous communication based on employing a mobile agent in wireless and mobile ad hoc networks, which we refer to as ARMA. Furthermore, we present the Malicious Encryption and Malicious ID attacks, as well as other attacks, and note how our scheme is robust to them. Through the proof of protocol correctness, our protocol is analyzed to show how it offers provable security properties.