计算机科学 ›› 2014, Vol. 41 ›› Issue (10): 177-183.doi: 10.11896/j.issn.1002-137X.2014.10.040
张中科,汪芸
ZHANG Zhong-ke and WANG Yun
摘要: 提出了基于网络分簇和多路径的自组织网络匿名通信协议(CMAR),该协议中节点首先在不暴露身份信息的情况下,利用双线性配对技术生成和邻居节点共享的密钥,并以此为基础,秘密地建立用于成员节点和簇头节点之间通信的簇内路由表项,在簇内路由表项的辅助下,完成源节点和目标节点之间多路径的匿名建立,以及数据报文的匿名转发。通过性能分析可以发现,CMAR协议的密码学运算负荷较低,且网络通信性能良好。
[1] Kong J,Hong X.ANODR:Anonymous on Demand Routingwith Untraceable routes for Mobile Ad-hoc Networks[C]∥Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing (MOBIHOC’03).2003:291-302 [2] Zhang Y,Liu W.MASK:Anonymous On-demand Routing inMobile Ad Hoc Networks[J].IEEE Transactions on Wireless Communications,2006,5(9):2376-2385 [3] Pongaliu K,Xiao L.Maintaining Source Privacy under Eaves-dropping and Node Compromise Attacks[C]∥Proceedings of the 30th IEEE International Conference on Computer Communications(INFOCOM’11).2008:1656-1664 [4] Liu J,Hong X,Kong J,et al.A Hierarchical anonymous Routing Scheme for Mobile Ad-Hoc Networks[C]∥Proceedings of the 2006 IEEE conference on Military communications (MILCOM’06).2006:2310-2316 [5] Zhang R,Zhang Y,Fang Y.AOS:An Anonymous Overlay System for Mobile.Ad hoc Networks[J].Wireless Networks,2011,17(4):843-859 [6] Nguyen A,Milosavljevic N,Fang Q,et al.Landmark Selection and Greedy Landmark-descent Routing for Sensor Networks[C]∥Proceedings of the 26th IEEE Conference on Computer Communications(INFOCOM’ 07).2007:661-669 [7] Shao M,Hu W.Cross-layer Enhanced Source Location Privacy in Sensor Networks[C]∥Proceedings of IEEE Conference on Sensor,Mesh & Ad Hoc Communication Networks (SECON’09).2009:1-9 [8] Wang H D,Sheng B,Li Q.Privacy-aware Routing in SensorNetworks[J].Computer Networks,2009,53(9):1512-1529 [9] Wang H,Sheng B,Tan C,et al.WM-ECC:an elliptic curve cryptography suite on sensor motes [R].Technical Report WM-CS-2007-11.CS Department,College of William and Mary,2007:1-14 [10] Oliveira L,Aranha D,Gouvêa C,et al.TinyPBC:Pairings for authenticated identity-based non-interactive key distribution in sensor networks [J].Computer Communications,2011,34(3):485-493 [11] Szczechowiak P,Kargl A,Scott M,et al.On the application of pairing based cryptography to wireless sensor networks[C]∥Proceedings of the 2nd ACM Conference on Wireless Network Security(WISEC’09).2009:1-12 [12] Ganesan P,Venugopalan R,Peddabachagari P,et al.Analyzing and modeling encryption overhead for sensor network nodes[C]∥Proceedings of the 2nd ACM International Conference on Wireless Sensor Networks and Applications(WSNA’03).2003:151-159 |
No related articles found! |
|