Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Location-aided routing (LAR) in mobile ad hoc networks
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Anonymous Secure Routing in Mobile Ad-Hoc Networks
LCN '04 Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks
A survey on peer-to-peer key management for mobile ad hoc networks
ACM Computing Surveys (CSUR)
Two-tier authentication for cluster and individual sets in mobile ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Information Sciences: an International Journal
A secure anonymous routing protocol with authenticated key exchange for ad hoc networks
Computer Standards & Interfaces
Non-interactive key establishment in mobile ad hoc networks
Ad Hoc Networks
Secure communications for cluster-based ad hoc networks using node identities
Journal of Network and Computer Applications
A stable weight-based on-demand routing protocol for mobile ad hoc networks
Information Sciences: an International Journal
Packet construction for secure conference call request in ad hoc network systems
Information Sciences: an International Journal
Multicast routing in mobile ad hoc networks by using a multiagent system
Information Sciences: an International Journal
An electronic voting protocol with deniable authentication for mobile ad hoc networks
Computer Communications
An efficient biometrics-based remote user authentication scheme using smart cards
Journal of Network and Computer Applications
A novel mobility model based on semi-random circular movement in mobile ad hoc networks
Information Sciences: an International Journal
Distributed routing in wireless sensor networks using energy welfare metric
Information Sciences: an International Journal
Energy efficient all-to-all broadcast in all-wireless networks
Information Sciences: an International Journal
A secure routing protocol with node selfishness resistance in MANETs
International Journal of Mobile Communications
On the security enhancement of an efficient and secure event signature protocol for p2p MMOGs
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part I
New directions in cryptography
IEEE Transactions on Information Theory
An efficient key predistribution scheme for ad hoc network security
IEEE Journal on Selected Areas in Communications
Anonymous overlay network supporting authenticated routing
Information Sciences: an International Journal
Information Sciences: an International Journal
Location-aware private service discovery in pervasive computing environment
Information Sciences: an International Journal
Toward a secure batch verification with group testing for VANET
Wireless Networks
Hi-index | 0.07 |
More attention should be paid to anonymous routing protocols in secure wireless ad hoc networks. However, as far as we know, only a few papers on secure routing protocols have addressed both issues of anonymity and efficiency. Most recent protocols adopted public key Infrastructure (PKI) solutions to ensure the anonymity and security of route constructing mechanisms. Since PKI solution requires huge and expensive infrastructure with complex computations and the resource constraints of small ad hoc devices; a two-layer authentication protocol with anonymous routing (TAPAR) is proposed in this paper. TAPAR does not adopt public key computations to provide secure and anonymous communications between source and destination nodes over wireless ad hoc networks. Moreover, TAPAR accomplishes mutual authentication, session key agreement, and forward secrecy among communicating nodes; along with integration of non-PKI techniques into the routing protocol allowing the source node to anonymously interact with the destination node through a number of intermediate nodes. Without adopting PKI en/decryptions, our proposed TAPAR can be efficiently implemented on small ad hoc devices while at least reducing the computational overhead of participating nodes in TAPAR by 21.75%. Our protocol is certainly favorable when compared with other related protocols.