Computer Science ›› 2014, Vol. 41 ›› Issue (10): 177-183.doi: 10.11896/j.issn.1002-137X.2014.10.040

Previous Articles     Next Articles

Cluster-based Multipath Anonymous Routing Protocol in Wireless Ad Hoc Networks

ZHANG Zhong-ke and WANG Yun   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Without disclosing the real identities of participating nodes,the shared session keys and secret link identifiers among neighbors are exchanged based on bilinear pairing,and further the local anonymous routing entries between the normal nodes and cluster head are built.With the help of local anonymous routing table,multi-path between source-destination can be constructed and data packets will be anonymously forwarded to destination along these paths.Simulation results show that CMAR achieves perfect anonymous communication with relatively low cost of communication and computation overhead.

Key words: Wireless ad hoc network,Network clustering,Multi-path,Anonymous communication

[1] Kong J,Hong X.ANODR:Anonymous on Demand Routingwith Untraceable routes for Mobile Ad-hoc Networks[C]∥Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing (MOBIHOC’03).2003:291-302
[2] Zhang Y,Liu W.MASK:Anonymous On-demand Routing inMobile Ad Hoc Networks[J].IEEE Transactions on Wireless Communications,2006,5(9):2376-2385
[3] Pongaliu K,Xiao L.Maintaining Source Privacy under Eaves-dropping and Node Compromise Attacks[C]∥Proceedings of the 30th IEEE International Conference on Computer Communications(INFOCOM’11).2008:1656-1664
[4] Liu J,Hong X,Kong J,et al.A Hierarchical anonymous Routing Scheme for Mobile Ad-Hoc Networks[C]∥Proceedings of the 2006 IEEE conference on Military communications (MILCOM’06).2006:2310-2316
[5] Zhang R,Zhang Y,Fang Y.AOS:An Anonymous Overlay System for Mobile.Ad hoc Networks[J].Wireless Networks,2011,17(4):843-859
[6] Nguyen A,Milosavljevic N,Fang Q,et al.Landmark Selection and Greedy Landmark-descent Routing for Sensor Networks[C]∥Proceedings of the 26th IEEE Conference on Computer Communications(INFOCOM’ 07).2007:661-669
[7] Shao M,Hu W.Cross-layer Enhanced Source Location Privacy in Sensor Networks[C]∥Proceedings of IEEE Conference on Sensor,Mesh & Ad Hoc Communication Networks (SECON’09).2009:1-9
[8] Wang H D,Sheng B,Li Q.Privacy-aware Routing in SensorNetworks[J].Computer Networks,2009,53(9):1512-1529
[9] Wang H,Sheng B,Tan C,et al.WM-ECC:an elliptic curve cryptography suite on sensor motes [R].Technical Report WM-CS-2007-11.CS Department,College of William and Mary,2007:1-14
[10] Oliveira L,Aranha D,Gouvêa C,et al.TinyPBC:Pairings for authenticated identity-based non-interactive key distribution in sensor networks [J].Computer Communications,2011,34(3):485-493
[11] Szczechowiak P,Kargl A,Scott M,et al.On the application of pairing based cryptography to wireless sensor networks[C]∥Proceedings of the 2nd ACM Conference on Wireless Network Security(WISEC’09).2009:1-12
[12] Ganesan P,Venugopalan R,Peddabachagari P,et al.Analyzing and modeling encryption overhead for sensor network nodes[C]∥Proceedings of the 2nd ACM International Conference on Wireless Sensor Networks and Applications(WSNA’03).2003:151-159

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!