SAnoVS: Secure anonymous voting scheme for clustered ad hoc networks

In this paper we propose a secure anonymous voting scheme (SAnoVS) for re-clustering in the ad-hoc network. SAnoVS extends our previous work of degree-based clustering algorithms by achieving anonymity and confidentiality of the voting procedure applied to select new cluster heads. The security of SAnoVS is based on the difficulty of computing discrete logarithms over elliptic curves, the intractability of inverting a one-way hash function and the fact that only neighboring nodes contribute to the generation of a shared secret. Furthermore, we achieve anonymity since our scheme does not require any identification information as we make use of a polynomial equation system combined with pseudo-random coordinates. The security analysis of our scheme is demonstrated with several attacks scenarios.

[1]  N. Pissinou,et al.  A framework for trust-based cluster head election in wireless sensor networks , 2006, Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems.

[2]  Jinn-ke Jan,et al.  Anonymous conference key distribution systems based on the discrete logarithm problem , 1999, Comput. Commun..

[3]  Min-Shiang Hwang,et al.  A new anonymous conference key distribution system based on the elliptic curve discrete logarithm problem , 2003, Comput. Stand. Interfaces.

[4]  Narendra Singh Yadav,et al.  A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks (MANETs) , 2009 .

[5]  C C. Chiang,et al.  Routing in Clustered Multihop, Mobile Wireless Networks With Fading Channel , 1997 .

[6]  Kee-Young Yoo,et al.  New conference key agreement protocol with user anonymity , 2005, Comput. Stand. Interfaces.

[7]  Christos Douligeris,et al.  LIDF: Layered intrusion detection framework for ad-hoc networks , 2009, Ad Hoc Networks.

[8]  Chak-Kuen Wong,et al.  A conference key distribution system , 1982, IEEE Trans. Inf. Theory.

[9]  Mario Gerla,et al.  Multicluster, mobile, multimedia radio network , 1995, Wirel. Networks.

[10]  Christos Douligeris,et al.  Degree-Based Clustering Algorithms for Wireless Ad Hoc Networks Under Attack , 2012, IEEE Communications Letters.

[11]  Tzong-Chen Wu,et al.  Conference Key Distribution System with User Anonymity Based on Algebraic Approach , 1997 .

[12]  Chu-Hsing Lin,et al.  Comments on the Yang-Chang-Hwang anonymous conference key distribution system , 2004, Comput. Stand. Interfaces.