An Efficient Anonymous Routing Protocol for Mobile Ad Hoc Networks

Providing anonymous routing in mobile ad hoc networks (MANET) has been a hot issue for the purpose of security and privacy concerns. But there are very few have been done about providing a valid method to detect malicious node and providing a trustworthy protection over whole network. In this paper, we introduce a localized trust management which can primarily remove malicious nodes, and propose an efficient anonymous routing protocol by node that participates in the protocol encrypts entire message with trust key and says Hello to its ancestor within expiration time. It makes malicious node can be detected and isolated from the network. In this way, a anonymous and secure route path can be established in a hostile environment. Meanwhile, it is able to efficiently against the Denial-of-Service (DoS) attack.

[1]  Chang Wen Chen,et al.  A New Network Layer for Mobile Ad Hoc Wireless Networks Based on Assignment Router Identity Protocol , 2007, 2007 16th International Conference on Computer Communications and Networks.

[2]  Donal O'Mahony,et al.  Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.

[3]  Ronggong Song,et al.  Secure dynamic distributed routing algorithm for ad hoc wireless networks , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..

[4]  Azzedine Boukerche,et al.  SDAR: a secure distributed anonymous routing protocol for wireless and mobile ad hoc networks , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[5]  Colin Boyd,et al.  Protocols for Authentication and Key Establishment , 2003, Information Security and Cryptography.

[6]  Li Xu,et al.  Secure Anonymous Routing in Trust and Clustered Wireless Ad Hoc Networks , 2007, 2007 Second International Conference on Communications and Networking in China.

[7]  A. Tamilarasi,et al.  A Defensive Mechanism to Defend against DoS / DDoS Attacks by IP Traceback with DPM , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).

[8]  P.S. Hiremath,et al.  Image Retrieval with Image Attention Based on User Input in a Multiresolution Grid Framework , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).

[9]  Myung-Kyun Kim,et al.  A Self-secure Routing Protocol for Large Mobile Ad hoc Networks , 2007, 2007 IFIP International Conference on Wireless and Optical Communications Networks.

[10]  Pin-Han Ho,et al.  ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks , 2007, 2007 IEEE International Conference on Communications.

[11]  Huafei Zhu,et al.  Provably secure anonymous identification protocols for ad-hoc access structures , 2005, 2005 IEEE 16th International Symposium on Personal, Indoor and Mobile Radio Communications.

[12]  Min-Hua Shao,et al.  Trust Enhanced Anonymous Routing in Mobile Ad-Hoc Networks , 2008, 2008 Ninth International Conference on Parallel and Distributed Computing, Applications and Technologies.