Secure Anonymous Routing in Clustered Multihop Wireless Ad Hoc Networks

Providing security and anonymity to users are critical in wireless ad hoc networks. In this paper, a secure anonymous routing scheme is proposed for clustered wireless ad hoc networks. In the proposed scheme, intra-cluster routing uses the common broadcast channel in wireless networks to provide anonymity, while inter-cluster routing uses a sequence of temporary public keys as the trapdoor information. Symmetric cipher is employed in most part of the proposed scheme to reduce computational complexity and maximize network efficiency. Public key is only used to distribute symmetric keys. Both privacy analysis (including sender anonymity, receiver anonymity and sender-receiver anonymity) and attack analysis show the effectiveness of the proposed scheme against a wide range of strong adversarial attacks.

[1]  Michael K. Reiter,et al.  Crowds: anonymity for Web transactions , 1998, TSEC.

[2]  Hans-Joachim Hof,et al.  A cluster-based security architecture for ad hoc networks , 2004, IEEE INFOCOM 2004.

[3]  Aravind Srinivasan,et al.  P/sup 5/ : a protocol for scalable anonymous communication , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[4]  Azzedine Boukerche,et al.  SDAR: a secure distributed anonymous routing protocol for wireless and mobile ad hoc networks , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[5]  Paul F. Syverson,et al.  Anonymous connections and onion routing , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[6]  Vijay Varadharajan,et al.  Security for cluster based ad hoc networks , 2004, Comput. Commun..

[7]  M. Jiang,et al.  Cluster based routing protocol (CBRP) , 1999 .

[8]  Xiaoyan Hong,et al.  ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks , 2003, MobiHoc '03.

[9]  Mohan S. Kankanhalli,et al.  Anonymous secure routing in mobile ad-hoc networks , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[10]  B. Bhattacharjee,et al.  A Protocol for Scalable Anonymous Communication , 1999 .

[11]  Wenjing Lou,et al.  Anonymous communications in mobile ad hoc networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[12]  Nathalie Weiler Secure anonymous group infrastructure for common and future Internet applications , 2001, Seventeenth Annual Computer Security Applications Conference.

[13]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.