About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
2nd International ICST Conference on Communications and Networking in China

Research Article

Secure Anonymous Routing in Trust and Clustered Wireless Ad Hoc Networks

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1109/CHINACOM.2007.4469552,
        author={Sisheng Chen and Li Xu and Zhide Chen},
        title={Secure Anonymous Routing in Trust and Clustered Wireless Ad Hoc Networks},
        proceedings={2nd International ICST Conference on Communications and Networking in China},
        publisher={IEEE},
        proceedings_a={CHINACOM},
        year={2008},
        month={3},
        keywords={Ad hoc networks  Broadcasting  Communication system security  Filters  Mobile ad hoc networks  Public key  Public key cryptography  Routing protocols  Scalability  Telecommunication traffic},
        doi={10.1109/CHINACOM.2007.4469552}
    }
    
  • Sisheng Chen
    Li Xu
    Zhide Chen
    Year: 2008
    Secure Anonymous Routing in Trust and Clustered Wireless Ad Hoc Networks
    CHINACOM
    IEEE
    DOI: 10.1109/CHINACOM.2007.4469552
Sisheng Chen1,*, Li Xu1,*, Zhide Chen1,*
  • 1: Key Laboratory of Network Security and Cryptology Fujian Normal University, Fuzhou,350007, China
*Contact email: chssh1982@sohu.com, xuli@fjnu.edu.cn, zhidechen@fjnu.edu.cn

Abstract

Wireless ad hoc networks , especially in the hostile environment, are vulnerable to traffic analysis which allows the adversary to trace the routing messages and the sensitive data packets. Anonymity mechanism in ad hoc networks is critical securing measure used to mitigate these problems. In this paper, we propose a novel secure anonymous routing scheme for clustered wireless ad hoc networks. In our proposed scheme, we use the bloom filter to establish secure anonymous routing in trust and clustered wireless ad hoc networks. It provides not only the basic sender and receiver anonymity, but also the link anonymity and the identity anonymity to the forwarders en route.

Keywords
Ad hoc networks Broadcasting Communication system security Filters Mobile ad hoc networks Public key Public key cryptography Routing protocols Scalability Telecommunication traffic
Published
2008-03-07
Publisher
IEEE
Modified
2011-07-18
http://dx.doi.org/10.1109/CHINACOM.2007.4469552
Copyright © 2007–2025 IEEE
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL