A Novel Anonymous Authentication Scheme in Ad Hoc Networks

Many authentication protocols in ad hoc networks are identity based, which means that in order for one node to trust another, it needs to know the other node’s identity. Hence there exists an inherent trade-off between trust and anonymity. We propose an anonymous authentication scheme, where each node, instead of using its real identity, generates a dynamic pseudonym using a one-way hash function. With the help of a CA offline, the scheme can realize the authentication procedure based on discrete logarithms problem. We analyze the security and the anonymity in the scheme, which shows that it is very valid.

[1]  Stefanos Gritzalis,et al.  Addressing Privacy: Matching User Requirements with Implementation Techniques , 2005 .

[2]  Zhi Li,et al.  An adaptive clustering routing transition protocol in ad hoc networks , 2008, Comput. Commun..

[3]  Shinichi Honiden,et al.  An authentication architecture for collaboration among agents in ad hoc networks , 2004 .

[4]  Christos Douligeris,et al.  Multifold node authentication in mobile ad hoc networks , 2007, Int. J. Commun. Syst..

[5]  Yunhao Liu,et al.  Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps , 2008, IEEE Transactions on Parallel and Distributed Systems.

[6]  Shiuh-Jeng Wang,et al.  Two-tier authentication for cluster and individual sets in mobile ad hoc networks , 2007, Comput. Networks.

[7]  W.-S. Juang,et al.  Anonymous channel and authentication in wireless communications , 1999, Comput. Commun..

[8]  Eitan Altman,et al.  Performance of ad hoc networks with two-hop relay routing and limited packet lifetime (extended version) , 2008, Perform. Evaluation.

[9]  Eitan Altman,et al.  Performance of Ad Hoc Networks with Two-Hop Relay Routing and Limited Packet Lifetime , 2006, IWQoS.

[10]  Bernhard Plattner,et al.  Density-Based Anycast: A Robust Routing Strategy for Wireless Ad Hoc Networks , 2008, IEEE/ACM Transactions on Networking.

[11]  Azzedine Boukerche,et al.  An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks , 2005, Comput. Commun..

[12]  Yuguang Fang,et al.  MASK: anonymous on-demand routing in mobile ad hoc networks , 2006, IEEE Transactions on Wireless Communications.