TY - GEN
T1 - A3RP
T2 - 2nd International Conference on Information Security and Assurance, ISA 2008
AU - Paik, Jung Ha
AU - Kim, Bum Han
AU - Lee, Dong Hoon
PY - 2008
Y1 - 2008
N2 - According to augmentation about interests for privacy in mobile network over the past few years, researches that provide the anonymity have been conducted in a number of applications. Ad hoc routing protocols with the provisions for anonymity both protect the privacy of nodes and also restrict the collection of network information by malicious nodes. Until recently, quite a number of anonymous routing protocols have been proposed. Many of them, however, do not make allowance for authentication. Thus, vulnerabilities such as modifications to packet data and denial of service attacks can be more easily exploited. In this paper, we propose the anonymous routing protocol also furnishing authentication in the mobile ad hoc network. This protocol supports these anonymity properties which should be provided in ad hoc network. In addition, authentication is also provided by group signature for both nodes and packets during route discovery phase.
AB - According to augmentation about interests for privacy in mobile network over the past few years, researches that provide the anonymity have been conducted in a number of applications. Ad hoc routing protocols with the provisions for anonymity both protect the privacy of nodes and also restrict the collection of network information by malicious nodes. Until recently, quite a number of anonymous routing protocols have been proposed. Many of them, however, do not make allowance for authentication. Thus, vulnerabilities such as modifications to packet data and denial of service attacks can be more easily exploited. In this paper, we propose the anonymous routing protocol also furnishing authentication in the mobile ad hoc network. This protocol supports these anonymity properties which should be provided in ad hoc network. In addition, authentication is also provided by group signature for both nodes and packets during route discovery phase.
UR - http://www.scopus.com/inward/record.url?scp=51349134049&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=51349134049&partnerID=8YFLogxK
U2 - 10.1109/ISA.2008.63
DO - 10.1109/ISA.2008.63
M3 - Conference contribution
AN - SCOPUS:51349134049
SN - 9780769531267
T3 - Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008
SP - 67
EP - 72
BT - Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008
Y2 - 24 April 2008 through 26 April 2008
ER -