About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
5th International Workshop on Resource Allocation, Cooperation and Competition in Wireless Networks

Research Article

A new collision-free pseudonym scheme in mobile ad hoc networks

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1109/WIOPT.2009.5291612,
        author={Ji Won  Yoon and Hyoungshick Kim},
        title={A new collision-free pseudonym scheme in mobile ad hoc networks},
        proceedings={5th International Workshop on Resource Allocation, Cooperation and Competition in Wireless Networks},
        publisher={IEEE},
        proceedings_a={RAWNET / WNC3},
        year={2009},
        month={10},
        keywords={Bandwidth  Computational complexity  Cryptographic protocols  Cryptography  Energy consumption  Mobile ad hoc networks  Mobile communication  Radio broadcasting  Road accidents  Telecommunication traffic},
        doi={10.1109/WIOPT.2009.5291612}
    }
    
  • Ji Won Yoon
    Hyoungshick Kim
    Year: 2009
    A new collision-free pseudonym scheme in mobile ad hoc networks
    RAWNET / WNC3
    IEEE
    DOI: 10.1109/WIOPT.2009.5291612
Ji Won Yoon1,*, Hyoungshick Kim2,*
  • 1: Department of Engineering Science, University of Oxford, UK.
  • 2: Computing Laboratory, University of Cambridge, UK.
*Contact email: jwyoon@robots.ox.ac.uk, hk331@cam.ac.uk

Abstract

A mobile ad hoc network (MANET) is a decentralized network of mobile nodes. Due to the broadcast nature of radio transmissions, communication in MANETs is more susceptible to malicious traffic analysis. An interesting problem is how to thwart malicious traffic analysis. Most anonymous communication protocols are based on the pseudonyms of mobile nodes. However, conventional pseudonym schemes have some limitations such as collisions of pseudonyms and high computational complexity due to the use of cryptographic hash functions. Collisions of identities are not desirable since they are the main causes for reduced effective bandwidth, increased energy consumption and non-deterministic data delivery. In this paper, we propose a new collision-free pseudonym scheme to enable anonymous communication. In our approach, each node generates pseudonyms by using a permutation matrix without collisions. The challenging issue is how to store the overall permutation matrix. It is practically hard to assume that mobile nodes maintain the permutation matrix due to the limitation of resources. Therefore we design the online computation of each node's own pseudonym without loading the overall matrix.

Keywords
Bandwidth Computational complexity Cryptographic protocols Cryptography Energy consumption Mobile ad hoc networks Mobile communication Radio broadcasting Road accidents Telecommunication traffic
Published
2009-10-23
Publisher
IEEE
http://dx.doi.org/10.1109/WIOPT.2009.5291612
Copyright © 2009–2025 IEEE
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL