Title | Key distribution protocol for Identity Hiding in MANETs |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Mohsen, Y., Hamdy, M., Shaaban, E. |
Conference Name | 2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS) |
Date Published | dec |
Keywords | Ad hoc networks, anonymous, authentication, authentication scheme, central administration, centralization problem, centralized counterpart, cluster head, clustered ad-hoc networks, compositionality, cryptographic protocols, cryptography, data privacy, high dense networks, identity, identity disclosure, identity hiding, identity spoofing, key distribution protocol, key distribution scheme, malicious nodes, MANET, manet privacy, MANETs, Metrics, mobile ad hoc networks, mobile ad-hoc networks, mobile computing, mobile nodes, networks scales, periodically updated security keys, pubcrawl, Receivers, Resiliency, Routing protocols, telecommunication security, wireless links |
Abstract | Mobile Ad-hoc Networks (MANETs) are formed when a group of mobile nodes, communicate through wireless links in the absence of central administration. These features make them more vulnerable to several attacks like identity spoofing which leads to identity disclosure. Providing anonymity and privacy for identity are critical issues, especially when the size of such networks scales up. to avoid the centralization problem for key distribution in MANETs. This paper proposes a key distribution scheme for clustered ad-hoc networks. The network is divided into groups of clusters, and each cluster head is responsible for distributing periodically updated security keys among cluster members, for protecting privacy through encryption. Also, an authentication scheme is proposed to ensure the confidentiality of new members to the cluster. The simulation study proves the effectiveness of the proposed scheme in terms of availability and overhead. It scales well for high dense networks and gives less packet drop rate compared to its centralized counterpart in the presence of malicious nodes. |
DOI | 10.1109/ICICIS46948.2019.9014807 |
Citation Key | mohsen_key_2019 |