5th International Workshop on Resource Allocation, Cooperation and Competition in Wireless Networks

Research Article

A new collision-free pseudonym scheme in mobile ad hoc networks

  • @INPROCEEDINGS{10.1109/WIOPT.2009.5291612,
        author={Ji Won  Yoon and Hyoungshick Kim},
        title={A new collision-free pseudonym scheme in mobile ad hoc networks},
        proceedings={5th International Workshop on Resource Allocation, Cooperation and Competition in Wireless Networks},
        publisher={IEEE},
        proceedings_a={RAWNET / WNC3},
        year={2009},
        month={10},
        keywords={Bandwidth  Computational complexity  Cryptographic protocols  Cryptography  Energy consumption  Mobile ad hoc networks  Mobile communication  Radio broadcasting  Road accidents  Telecommunication traffic},
        doi={10.1109/WIOPT.2009.5291612}
    }
    
  • Ji Won Yoon
    Hyoungshick Kim
    Year: 2009
    A new collision-free pseudonym scheme in mobile ad hoc networks
    RAWNET / WNC3
    IEEE
    DOI: 10.1109/WIOPT.2009.5291612
Ji Won Yoon1,*, Hyoungshick Kim2,*
  • 1: Department of Engineering Science, University of Oxford, UK.
  • 2: Computing Laboratory, University of Cambridge, UK.
*Contact email: jwyoon@robots.ox.ac.uk, hk331@cam.ac.uk

Abstract

A mobile ad hoc network (MANET) is a decentralized network of mobile nodes. Due to the broadcast nature of radio transmissions, communication in MANETs is more susceptible to malicious traffic analysis. An interesting problem is how to thwart malicious traffic analysis. Most anonymous communication protocols are based on the pseudonyms of mobile nodes. However, conventional pseudonym schemes have some limitations such as collisions of pseudonyms and high computational complexity due to the use of cryptographic hash functions. Collisions of identities are not desirable since they are the main causes for reduced effective bandwidth, increased energy consumption and non-deterministic data delivery. In this paper, we propose a new collision-free pseudonym scheme to enable anonymous communication. In our approach, each node generates pseudonyms by using a permutation matrix without collisions. The challenging issue is how to store the overall permutation matrix. It is practically hard to assume that mobile nodes maintain the permutation matrix due to the limitation of resources. Therefore we design the online computation of each node's own pseudonym without loading the overall matrix.