期刊文献+

基于网络分簇和多路径的无线自组织网络匿名通信协议 被引量:1

Cluster-based Multipath Anonymous Routing Protocol in Wireless Ad Hoc Networks
下载PDF
导出
摘要 提出了基于网络分簇和多路径的自组织网络匿名通信协议(CMAR),该协议中节点首先在不暴露身份信息的情况下,利用双线性配对技术生成和邻居节点共享的密钥,并以此为基础,秘密地建立用于成员节点和簇头节点之间通信的簇内路由表项,在簇内路由表项的辅助下,完成源节点和目标节点之间多路径的匿名建立,以及数据报文的匿名转发。通过性能分析可以发现,CMAR协议的密码学运算负荷较低,且网络通信性能良好。 Without disclosing the real identities of participating nodes, the shared session keys and secret link identifiers among neighbors are exchanged based on bilinear pairing, and further the local anonymous routing entries between the normal nodes and cluster head are built. With the help of local anonymous routing table, multi-path between source-destination can be constructed and data packets will be anonymously forwarded to destination along these paths. Simulation results show that CMAR achieves perfect anonymous communication with relatively low cost of communication and computation overhead.
作者 张中科 汪芸
出处 《计算机科学》 CSCD 北大核心 2014年第10期177-183,共7页 Computer Science
基金 国家高技术研究发展计划("863"计划)基金资助项目(2011AA040502)资助
关键词 无线自组织网络 网络分簇 多路径 匿名通信 Wireless ad hoc network, Network clustering, Multi-path, Anonymous communication
  • 相关文献

参考文献12

  • 1Kong J,Hong X.ANODR:Anonymous on Demand Routingwith Untraceable routes for Mobile Ad-hoc Networks[C]∥Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing (MOBIHOC’03).2003:291-302.
  • 2Zhang Y,Liu W.MASK:Anonymous On-demand Routing inMobile Ad Hoc Networks[J].IEEE Transactions on Wireless Communications,2006,5(9):2376-2385.
  • 3Pongaliu K,Xiao L.Maintaining Source Privacy under Eaves-dropping and Node Compromise Attacks[C]∥Proceedings of the 30th IEEE International Conference on Computer Communications(INFOCOM’11).2008:1656-1664.
  • 4Liu J,Hong X,Kong J,et al.A Hierarchical anonymous Routing Scheme for Mobile Ad-Hoc Networks[C]∥Proceedings of the 2006 IEEE conference on Military communications (MILCOM’06).2006:2310-2316.
  • 5Zhang R,Zhang Y,Fang Y.AOS:An Anonymous Overlay System for Mobile.Ad hoc Networks[J].Wireless Networks,2011,17(4):843-859.
  • 6Nguyen A,Milosavljevic N,Fang Q,et al.Landmark Selection and Greedy Landmark-descent Routing for Sensor Networks[C]∥Proceedings of the 26th IEEE Conference on Computer Communications(INFOCOM’ 07).2007:661-669.
  • 7Shao M,Hu W.Cross-layer Enhanced Source Location Privacy in Sensor Networks[C]∥Proceedings of IEEE Conference on Sensor,Mesh & Ad Hoc Communication Networks (SECON’09).2009:1-9.
  • 8Wang H D,Sheng B,Li Q.Privacy-aware Routing in SensorNetworks[J].Computer Networks,2009,53(9):1512-1529.
  • 9Wang H,Sheng B,Tan C,et al.WM-ECC:an elliptic curve cryptography suite on sensor motes [R].Technical Report WM-CS-2007-11.CS Department,College of William and Mary,2007:1-14.
  • 10Oliveira L,Aranha D,Gouvêa C,et al.TinyPBC:Pairings for authenticated identity-based non-interactive key distribution in sensor networks [J].Computer Communications,2011,34(3):485-493.

同被引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部