Anonymity, unlinkability and unobservability in mobile ad hoc networks
Title | Anonymity, unlinkability and unobservability in mobile ad hoc networks |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Vijayan, A., Thomas, T. |
Conference Name | Communications and Signal Processing (ICCSP), 2014 International Conference on |
Date Published | April |
Keywords | Ad hoc networks, anonymity, anonymous routing, AODV, centralized monitoring, Communication system security, cooperative algorithms, cooperative communication, cryptography, cryptosystems, dynamic topology, group signature scheme, ID based encryption scheme, mobile ad hoc networks, ns2, private key cryptography, public key cryptography, public-private key pairs, route discovery process, Routing, Routing protocols, routing schemes, secure communications, security, security attacks, telecommunication network topology, telecommunication security, unlinkability, unobservability, user privacy, USOR, wired networks, Wireless communication |
Abstract | Mobile ad hoc networks have the features of open medium, dynamic topology, cooperative algorithms, lack of centralized monitoring etc. Due to these, mobile ad hoc networks are much vulnerable to security attacks when compared to wired networks. There are various routing protocols that have been developed to cope up with the limitations imposed by the ad hoc networks. But none of these routing schemes provide complete unlinkability and unobservability. In this paper we have done a survey about anonymous routing and secure communications in mobile ad hoc networks. Different routing protocols are analyzed based on public/private key pairs and cryptosystems, within that USOR can well protect user privacy against both inside and outside attackers. It is a combination of group signature scheme and ID based encryption scheme. These are run during the route discovery process. We implement USOR on ns2, and then its performance is compared with AODV. |
URL | http://ieeexplore.ieee.org/document/6950171/ |
DOI | 10.1109/ICCSP.2014.6950171 |
Citation Key | 6950171 |
- telecommunication network topology
- public-private key pairs
- route discovery process
- Routing
- Routing protocols
- routing schemes
- secure communications
- security
- security attacks
- public key cryptography
- telecommunication security
- unlinkability
- unobservability
- user privacy
- USOR
- wired networks
- Wireless communication
- Ad hoc networks
- private key cryptography
- ns2
- mobile ad hoc networks
- ID based encryption scheme
- group signature scheme
- dynamic topology
- cryptosystems
- Cryptography
- cooperative communication
- cooperative algorithms
- Communication system security
- centralized monitoring
- AODV
- anonymous routing
- anonymity