IDEAS home Printed from https://ideas.repec.org/a/sae/intdis/v5y2009i1p56-56.html
   My bibliography  Save this article

Secure and Anonymous Source Routing Protocol for Wireless Ad Hoc Networks

Author

Listed:
  • Li Xu
  • Sisheng Chen

Abstract

Wireless ad hoc network is formed by a group of mobile hosts that communicate through radio transmissions. In the hostile environment, this kind of network is vulnerable to traffic analysis which allows the adversary to trace the routing messages and the sensitive data packets. So, anonymous routing protocol for ad hoc networks is an important thing and has attracted more and more attention recently. In this paper, we propose a novel, secure, and anonymous source routing, called SADSR (Secure and Anonymous Dynamic Source Routing) based on DSR. During the routing request of the SADSR, in order to hide the identity, the source node uses its current pseudonym to sponsor the routing request. And it uses the hash value of the changing share key between the source and destination as the tag of the destination. Meanwhile, it employs an initialized Bloom Filter as the routing record table to record the route. When the intermediate nodes receive the routing request, it randomly chooses a secret key and adds its identity into the Bloom Filter with seeding the secret key. So, when the destination node receives the routing request, the Bloom Filter has recorded the route information. Because the feature of the pseudonym employed in our scheme, the destination node can authenticate the source node and updates their share secret key when it replies to the routing request. During the routing reply phase, the intermediate node can determine whether it is the router by checking the Bloom Filter in the reply packet. The router applies the pseudonym based signature to protect the message during the routing reply phase, which makes sure that the neighborhood node en route can authenticate the upstream node and does not disclose its identity. SADSR also contains the routing maintenance and secure anonymous data transmission which are separately used by the end-to-end validate mechanism and HMAC strategy. The performance of security and anonymity of SADSR is analyzed by both in theory and simulation. Compared to the other anonymous routing protocols, SADSR is not only an anonymous routing protocol, but also a secure one. It can provide authentication and integrity, anonymous neighborhood, identity anonymity, and route anonymity. The simulation results using NS-2 indicate that though SADSR is a secure and anonymous routing protocol, but the efficiency of SADSR is close to the secure routing protocol SDSR and anonymous routing protocol AnonDSR.

Suggested Citation

  • Li Xu & Sisheng Chen, 2009. "Secure and Anonymous Source Routing Protocol for Wireless Ad Hoc Networks," International Journal of Distributed Sensor Networks, , vol. 5(1), pages 56-56, January.
  • Handle: RePEc:sae:intdis:v:5:y:2009:i:1:p:56-56
    DOI: 10.1080/15501320802554539
    as

    Download full text from publisher

    File URL: https://journals.sagepub.com/doi/10.1080/15501320802554539
    Download Restriction: no

    File URL: https://libkey.io/10.1080/15501320802554539?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:sae:intdis:v:5:y:2009:i:1:p:56-56. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: SAGE Publications (email available below). General contact details of provider: .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.