Networks without user observability—design options
Proc. of a workshop on the theory and application of cryptographic techniques on Advances in cryptology---EUROCRYPT '85
Password authentication with insecure communication
Communications of the ACM
An Architecture for an Anonymity Network
WETICE '01 Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Anonymous Secure Routing in Mobile Ad-Hoc Networks
LCN '04 Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks
SDAR: A Secure Distributed Anonymous Routing Protocol for Wireless and Mobile Ad Hoc Networks
LCN '04 Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks
Mobility Changes Anonymity: Mobile Ad Hoc Networks Need Efficient Anonymous Routing
ISCC '05 Proceedings of the 10th IEEE Symposium on Computers and Communications
AnonDSR: efficient anonymous dynamic source routing for mobile ad-hoc networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
LCN '07 Proceedings of the 32nd IEEE Conference on Local Computer Networks
Acimn protocol: a protocol for anonymous communication in multi hop wireless networks
AISC '08 Proceedings of the sixth Australasian conference on Information security - Volume 81
A3RP: Anonymous and Authenticated Ad Hoc Routing Protocol
ISA '08 Proceedings of the 2008 International Conference on Information Security and Assurance (isa 2008)
ARM: anonymous routing protocol for mobile ad hoc networks
International Journal of Wireless and Mobile Computing
Towards a theory of anonymous networking
INFOCOM'10 Proceedings of the 29th conference on Information communications
TARo: Trusted Anonymous Routing for MANETs
EUC '10 Proceedings of the 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
Efficient constructions for one-way hash chains
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
MASK: anonymous on-demand routing in mobile ad hoc networks
IEEE Transactions on Wireless Communications
New directions in cryptography
IEEE Transactions on Information Theory
Routing security in wireless ad hoc networks
IEEE Communications Magazine
An Enhanced Mobile-Healthcare Emergency System Based on Extended Chaotic Maps
Journal of Medical Systems
An anonymous distributed routing protocol in mobile ad-hoc networks
The Journal of Supercomputing
Hi-index | 0.24 |
Anonymity of mobile devices and their data is an essential requirement to facilitate the deployment of future Mobile Ad hoc Networks. The currently proposed anonymous routing mechanisms for such networks inherently include a trade-off between a high level of anonymity, performance and scalability. In this paper (parts of this paper have been published in TrustCom 2010), we propose an anonymous routing protocol that provides improved anonymity and security while achieving similar or better performance, as compared to existing proposals. Our proposal achieves anonymity using an efficient solution for invisible implicit addressing based on keyed hash chain and security via a novel application of one-to-many Diffie-Hellman mechanism, used to exchange keys for symmetric encryption. The final contribution includes a mechanism to facilitate selection of a trusted route by verifying connections between intermediate nodes. We demonstrate the benefits of our proposal in comparison with previous approaches using analysis and simulation.