2nd International ICST Conference on Communications and Networking in China

Research Article

Secure Anonymous Routing in Trust and Clustered Wireless Ad Hoc Networks

  • @INPROCEEDINGS{10.1109/CHINACOM.2007.4469552,
        author={Sisheng Chen and Li Xu and Zhide Chen},
        title={Secure Anonymous Routing in Trust and Clustered Wireless Ad Hoc Networks},
        proceedings={2nd International ICST Conference on Communications and Networking in China},
        publisher={IEEE},
        proceedings_a={CHINACOM},
        year={2008},
        month={3},
        keywords={Ad hoc networks  Broadcasting  Communication system security  Filters  Mobile ad hoc networks  Public key  Public key cryptography  Routing protocols  Scalability  Telecommunication traffic},
        doi={10.1109/CHINACOM.2007.4469552}
    }
    
  • Sisheng Chen
    Li Xu
    Zhide Chen
    Year: 2008
    Secure Anonymous Routing in Trust and Clustered Wireless Ad Hoc Networks
    CHINACOM
    IEEE
    DOI: 10.1109/CHINACOM.2007.4469552
Sisheng Chen1,*, Li Xu1,*, Zhide Chen1,*
  • 1: Key Laboratory of Network Security and Cryptology Fujian Normal University, Fuzhou,350007, China
*Contact email: chssh1982@sohu.com, xuli@fjnu.edu.cn, zhidechen@fjnu.edu.cn

Abstract

Wireless ad hoc networks , especially in the hostile environment, are vulnerable to traffic analysis which allows the adversary to trace the routing messages and the sensitive data packets. Anonymity mechanism in ad hoc networks is critical securing measure used to mitigate these problems. In this paper, we propose a novel secure anonymous routing scheme for clustered wireless ad hoc networks. In our proposed scheme, we use the bloom filter to establish secure anonymous routing in trust and clustered wireless ad hoc networks. It provides not only the basic sender and receiver anonymity, but also the link anonymity and the identity anonymity to the forwarders en route.