Research Article
Secure Anonymous Routing in Trust and Clustered Wireless Ad Hoc Networks
@INPROCEEDINGS{10.1109/CHINACOM.2007.4469552, author={Sisheng Chen and Li Xu and Zhide Chen}, title={Secure Anonymous Routing in Trust and Clustered Wireless Ad Hoc Networks}, proceedings={2nd International ICST Conference on Communications and Networking in China}, publisher={IEEE}, proceedings_a={CHINACOM}, year={2008}, month={3}, keywords={Ad hoc networks Broadcasting Communication system security Filters Mobile ad hoc networks Public key Public key cryptography Routing protocols Scalability Telecommunication traffic}, doi={10.1109/CHINACOM.2007.4469552} }
- Sisheng Chen
Li Xu
Zhide Chen
Year: 2008
Secure Anonymous Routing in Trust and Clustered Wireless Ad Hoc Networks
CHINACOM
IEEE
DOI: 10.1109/CHINACOM.2007.4469552
Abstract
Wireless ad hoc networks , especially in the hostile environment, are vulnerable to traffic analysis which allows the adversary to trace the routing messages and the sensitive data packets. Anonymity mechanism in ad hoc networks is critical securing measure used to mitigate these problems. In this paper, we propose a novel secure anonymous routing scheme for clustered wireless ad hoc networks. In our proposed scheme, we use the bloom filter to establish secure anonymous routing in trust and clustered wireless ad hoc networks. It provides not only the basic sender and receiver anonymity, but also the link anonymity and the identity anonymity to the forwarders en route.
Copyright © 2007–2024 IEEE