A3RP

Anonymous and authenticated ad hoc routing protocol

Jung Ha Paik, Bum Han Kim, Dong Hoon Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

26 Citations (Scopus)

Abstract

According to augmentation about interests for privacy in mobile network over the past few years, researches that provide the anonymity have been conducted in a number of applications. Ad hoc routing protocols with the provisions for anonymity both protect the privacy of nodes and also restrict the collection of network information by malicious nodes. Until recently, quite a number of anonymous routing protocols have been proposed. Many of them, however, do not make allowance for authentication. Thus, vulnerabilities such as modifications to packet data and denial of service attacks can be more easily exploited. In this paper, we propose the anonymous routing protocol also furnishing authentication in the mobile ad hoc network. This protocol supports these anonymity properties which should be provided in ad hoc network. In addition, authentication is also provided by group signature for both nodes and packets during route discovery phase.

Original languageEnglish
Title of host publicationProceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008
Pages67-72
Number of pages6
DOIs
Publication statusPublished - 2008 Sep 15
Event2nd International Conference on Information Security and Assurance, ISA 2008 - Busan, Korea, Republic of
Duration: 2008 Apr 242008 Apr 26

Other

Other2nd International Conference on Information Security and Assurance, ISA 2008
CountryKorea, Republic of
CityBusan
Period08/4/2408/4/26

Fingerprint

Routing protocols
Authentication
anonymity
privacy
Mobile ad hoc networks
Ad hoc networks
Wireless networks
Network protocols
vulnerability
Ad hoc
Routing
Anonymity
Node
Group
Privacy

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Information Systems and Management
  • Electrical and Electronic Engineering
  • Communication

Cite this

Paik, J. H., Kim, B. H., & Lee, D. H. (2008). A3RP: Anonymous and authenticated ad hoc routing protocol. In Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008 (pp. 67-72). [4511536] https://doi.org/10.1109/ISA.2008.63

A3RP : Anonymous and authenticated ad hoc routing protocol. / Paik, Jung Ha; Kim, Bum Han; Lee, Dong Hoon.

Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. 2008. p. 67-72 4511536.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Paik, JH, Kim, BH & Lee, DH 2008, A3RP: Anonymous and authenticated ad hoc routing protocol. in Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008., 4511536, pp. 67-72, 2nd International Conference on Information Security and Assurance, ISA 2008, Busan, Korea, Republic of, 08/4/24. https://doi.org/10.1109/ISA.2008.63
Paik JH, Kim BH, Lee DH. A3RP: Anonymous and authenticated ad hoc routing protocol. In Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. 2008. p. 67-72. 4511536 https://doi.org/10.1109/ISA.2008.63
Paik, Jung Ha ; Kim, Bum Han ; Lee, Dong Hoon. / A3RP : Anonymous and authenticated ad hoc routing protocol. Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. 2008. pp. 67-72
@inproceedings{34be82f9ae124ab89104a0948e86081c,
title = "A3RP: Anonymous and authenticated ad hoc routing protocol",
abstract = "According to augmentation about interests for privacy in mobile network over the past few years, researches that provide the anonymity have been conducted in a number of applications. Ad hoc routing protocols with the provisions for anonymity both protect the privacy of nodes and also restrict the collection of network information by malicious nodes. Until recently, quite a number of anonymous routing protocols have been proposed. Many of them, however, do not make allowance for authentication. Thus, vulnerabilities such as modifications to packet data and denial of service attacks can be more easily exploited. In this paper, we propose the anonymous routing protocol also furnishing authentication in the mobile ad hoc network. This protocol supports these anonymity properties which should be provided in ad hoc network. In addition, authentication is also provided by group signature for both nodes and packets during route discovery phase.",
author = "Paik, {Jung Ha} and Kim, {Bum Han} and Lee, {Dong Hoon}",
year = "2008",
month = "9",
day = "15",
doi = "10.1109/ISA.2008.63",
language = "English",
isbn = "9780769531267",
pages = "67--72",
booktitle = "Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008",

}

TY - GEN

T1 - A3RP

T2 - Anonymous and authenticated ad hoc routing protocol

AU - Paik, Jung Ha

AU - Kim, Bum Han

AU - Lee, Dong Hoon

PY - 2008/9/15

Y1 - 2008/9/15

N2 - According to augmentation about interests for privacy in mobile network over the past few years, researches that provide the anonymity have been conducted in a number of applications. Ad hoc routing protocols with the provisions for anonymity both protect the privacy of nodes and also restrict the collection of network information by malicious nodes. Until recently, quite a number of anonymous routing protocols have been proposed. Many of them, however, do not make allowance for authentication. Thus, vulnerabilities such as modifications to packet data and denial of service attacks can be more easily exploited. In this paper, we propose the anonymous routing protocol also furnishing authentication in the mobile ad hoc network. This protocol supports these anonymity properties which should be provided in ad hoc network. In addition, authentication is also provided by group signature for both nodes and packets during route discovery phase.

AB - According to augmentation about interests for privacy in mobile network over the past few years, researches that provide the anonymity have been conducted in a number of applications. Ad hoc routing protocols with the provisions for anonymity both protect the privacy of nodes and also restrict the collection of network information by malicious nodes. Until recently, quite a number of anonymous routing protocols have been proposed. Many of them, however, do not make allowance for authentication. Thus, vulnerabilities such as modifications to packet data and denial of service attacks can be more easily exploited. In this paper, we propose the anonymous routing protocol also furnishing authentication in the mobile ad hoc network. This protocol supports these anonymity properties which should be provided in ad hoc network. In addition, authentication is also provided by group signature for both nodes and packets during route discovery phase.

UR - http://www.scopus.com/inward/record.url?scp=51349134049&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=51349134049&partnerID=8YFLogxK

U2 - 10.1109/ISA.2008.63

DO - 10.1109/ISA.2008.63

M3 - Conference contribution

SN - 9780769531267

SP - 67

EP - 72

BT - Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008

ER -