scispace - formally typeset
Journal ArticleDOI

MASK: anonymous on-demand routing in mobile ad hoc networks

Reads0
Chats0
TLDR
A novel anonymous on-demand routing protocol, termed MASK, which can accomplish both MAC-layer and network-layer communications without disclosing real IDs of the participating nodes under a rather strong adversary model and is resistant to a wide range of attacks.
Abstract
The shared wireless medium of mobile ad hoc networks facilitates passive, adversarial eavesdropping on data communications whereby adversaries can launch various devastating attacks on the target network. To thwart passive eavesdropping and the resulting attacks, we propose a novel anonymous on-demand routing protocol, termed MASK, which can accomplish both MAC-layer and network-layer communications without disclosing real IDs of the participating nodes under a rather strong adversary model. MASK offers the anonymity of senders, receivers, and sender-receiver relationships in addition to node unlocatability and untrackability and end-to-end flow untraceability. It is also resistant to a wide range of attacks. Moreover, MASK preserves the high routing efficiency as compared to previous proposals. Detailed simulation studies have shown that MASK is highly effective and efficient

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Securing Mobile Ad Hoc Networks with Certificateless Public Keys

TL;DR: IKM is a certificateless solution in that public keys of mobile nodes are directly derivable from their known IDs plus some common information, which eliminates the need for certificate-based authenticated public-key distribution indispensable in conventional public- key management schemes.
Journal ArticleDOI

Secure localization and authentication in ultra-wideband sensor networks

TL;DR: This paper first analyzes the security of existing localization techniques, then develops a mobility-assisted secure localization scheme and proposes a location-based scheme to enable secure authentication in UWB sensor networks.
Proceedings ArticleDOI

ALARM: Anonymous Location-Aided Routing in Suspicious MANETs

TL;DR: This work addresses a number of issues arising in suspicious location-based MANET settings by designing and analyzing a privacy-preserving and secure link-state based routing protocol (ALARM), which provides both security and privacy features, including node authentication, data integrity, anonymity, and untraceability.
Proceedings ArticleDOI

Protecting Receiver-Location Privacy in Wireless Sensor Networks

TL;DR: A location-privacy routing protocol (LPR) that is easy to implement and provides path diversity combined with fake packet injection is proposed, able to minimize the traffic direction information that an adversary can retrieve from eavesdropping.
Proceedings ArticleDOI

HOP: achieving efficient anonymity in MANETs by combining HIP, OLSR, and pseudonyms

TL;DR: This paper proposes and implements HOP, a novel solution based on cryptographic Host Identity Protocol (HIP) that offers security and user-level anonymity in MANET environments while maintaining good performance levels and introduces enhancements to the authentication process to achieve Host Identity Tag (HIT) relationship anonymity.
References
More filters
Journal ArticleDOI

How to share a secret

TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Book

Handbook of Applied Cryptography

TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.

Ad hoc On-Demand Distance Vector (AODV) Routing

TL;DR: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.

Dynamic Source Routing in Ad Hoc Wireless Networks.

TL;DR: In this article, the authors present a protocol for routing in ad hoc networks that uses dynamic source routing, which adapts quickly to routing changes when host movement is frequent, yet requires little or no overhead during periods in which hosts move less frequently.
Book ChapterDOI

Dynamic Source Routing in Ad Hoc Wireless Networks

TL;DR: This paper presents a protocol for routing in ad hoc networks that uses dynamic source routing that adapts quickly to routing changes when host movement is frequent, yet requires little or no overhead during periods in which hosts move less frequently.
Related Papers (5)