期刊文献+

一个高效的双向无线Ad Hoc网络匿名路由协议 被引量:3

Efficient bidirectional anonymous routing protocol for wireless Ad Hoc networks
下载PDF
导出
摘要 分析了Ad Hoc网络现有匿名路由协议的不足,提出了一个轻量级的,能提供良好匿名保护的基于反应式的源路由协议的匿名路由协议。该协议利用布隆过滤器实现了在ASR中定义的身份匿名、路由匿名和位置/拓朴匿名。它主要使用的是哈希运算,并在不破坏协议匿名性的前提下,通过控制路由请求包避免其在网络中传输时间过长而提高整个网络的效率。协议中建立起的匿名链路具有双向性,这也降低了匿名协议的耗费。仿真数据与分析证明了新协议的有效性与匿名性。 A lightweight anonymous routing protocol was presented, which was based on reactive source routing. It enables complete anonymity of identity, route and topology defined in ASR, using Bloom Filter. The main computationally intensive operation in use is hashing and it does not need to use any public key operation. Without eroding the topology anonymity, it actualizes hop control to avoid the excessive propagation of route requests in order to enhance the efficiency of the network. In addition, the anonymous links established in this protocol are bidirectional, which also helps to reduce the overhead of the anonymous protocols. Detailed analysis and simulation show that the new protocol achieves good anonymity and efficiency.
出处 《计算机应用》 CSCD 北大核心 2008年第9期2220-2224,共5页 journal of Computer Applications
基金 国家自然科学基金资助项目(60502047) 福建省教育厅重点项目(JA07030)
关键词 匿名通信 路由协议 AD HOC网络 anonymous communication routing protocol Ad Hoc networks
  • 相关文献

参考文献14

  • 1CHAUM D. Untraceable electronic mail, return addresses, and digital pseudonyms [J]. Communications of the ACM, 1981,24 (2):84 -88.
  • 2SOLA M, OHTA M, MAENO T. Scalability of intemet multicast protocols[ C/OL]. [ 2008 - 01 - 01 ]. http://www.cnaf. infn. it/-ferrari/papers/muhi/scale/scale. htm.
  • 3REED M, SYVERSON P, GOLDSCHLAG D. Anonymous connections and onion muting [ J]. IEEE Journal of Selected Areas in Communications, 1998, 16(4): 482-494.
  • 4GOLDSCHLAG D, REED M, SYVERSON P. Onion routing for anonymous and private internet connections[ J]. Communications of the ACM, 1999, 42(2) :39 -41.
  • 5CHAUM D. The dining cryptographers problem: Unconditional sender and recipient untraceability [ J ]. Journal of Cryptology. 1988, 1(1): 65-75.
  • 6KONG JIE-JUN, HONG XIAO-YAN, GERLA M. ANODR: ANonymous on demand routing with untraceable routes for mobile Ad-hoc networks[ C]// Proceedings of ACM International Symposium on Mobile Ad hoc Networking & Computing ( MobiHoc 2003 ). New York: ACM Press, 2003:291 - 302.
  • 7BOUKERCHE A, EI-KHATIB K, XU L, et al. A novel solution for achieving anonymity in wireless ad hoc networks[ C]// Proceedings of the I st ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks. New York: ACM Press, 2004:30-38.
  • 8ZHU BO, WANG ZHI-GUO, KANKANHALLI M S, et al. Anonymous secure routing in mobile Ad Hoc networks[ C]//Proceedings of The 29th Annual IEEE Conference on Local Computer Networks (LCN' 2004). New York:ACM Press, 2004: 16-18.
  • 9ZHANG YAN-CHAO, LIU WEI, LUO WEN-JING. Anonymous communications in mobile ad hoc networks[ C]//Proceedings of the 24th International Conference of the IEEE Communications Society (INFOCOM 2005). Washington, DC: IEEE Press, 2005:13 - 17.
  • 10SEYS S, PRENEEL B. ARM: Anonymous routing protocol for mobile Ad Hoc networks[ C]// Proceedings of the 20th International Conference on Advanced Information Networking and Applications(AINA'06). Washington, DC: IEEE Computer Society, 2006:133 - 137.

同被引文献21

  • 1刘林涛,刘乃安.对移动Ad Hoc网络AODV路由协议的改进[J].电子科技,2006,19(11):35-37. 被引量:2
  • 2高圣国,王汉兴,胡细.一个优化的AODV路由协议[J].计算机工程与应用,2007,43(3):128-130. 被引量:10
  • 3Lin Yong,Boukerche A.ARMA:A scalable secure routing protocol with privacy protection for mobile ad hoc network[J].Wireless Communications and Mobile Computing, 2010,10: 672-687.
  • 4Anjum F,Mouchtaris P.Security for wireless ad hoc networks[M]. Beijing: Tsinghua University,2009.
  • 5Zhu Bo, Wang Zhiguo, Kankanhalli M S, ct al.Anonymous secure touting in mobile Ad Hoc nctworks[C]//Proceedings of the I st ACM Intcrnational Workshop on Performance Evaluation of Wirclcss Ad Hoc Scnsor and Ubiquitous Networks.New York: ACM Press,2004:30-38.
  • 6Freudiger J,Raya M,Hubaux J P.Selforganized anonymous authentication in mobile ad hoc networks[C]//Security and Privacy in Communication Networks.[S.l.]:Springer,2009:350-372.
  • 7Dong Ying, Chim T W, Li V O K, et al.ARMR: Anonymous routing protocol with multiple routes for communications in mobile ad hoe networks[J].Ad Hoc Networks,2009,7(8):1536-1550.
  • 8Reed M, Syverson P, Goldschlag D.Proxies for anonymous routing[C]//Proceedings of 12th Annual Computer Security Applications Conference, 1996:95-104.
  • 9Boukerche A, ElKhatib K,Xu L, et al.A novel solution for achieving anonymity in wireless ad hoc networks[C]//Proceedings of the 1st ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks.[S.1.]: ACM Press, 2004 : 30-38.
  • 10Kong J, Hong X, ANODR: Anonymous on demand routing with untraceable routes for mobile adhoc network[C]//Proeeedings of the 4th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2003).IS.1.] : ACM Press, 2003: 291-302.

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部