• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhang Yang. Formal Treatment of an Anonymous On-Demand Routing Protocol in MANETs[J]. Journal of Computer Research and Development, 2008, 45(7): 1142-1150.
Citation: Zhang Yang. Formal Treatment of an Anonymous On-Demand Routing Protocol in MANETs[J]. Journal of Computer Research and Development, 2008, 45(7): 1142-1150.

Formal Treatment of an Anonymous On-Demand Routing Protocol in MANETs

More Information
  • Published Date: July 14, 2008
  • Existing anonymous routing protocols have only had unsatisfactory anonymity analysis in MANETs, because adversarial models have not been given exactly,the security definition of cryptographic primitives have not been described, and rigorous proofs are lacking. To address this problem a typical anonymous dynamic source routing protocol is improved, and the formal treatment of this protocol is then proposed in this paper. The static attack power is defined for adversarial models to clarify the capacity of adversaries, and the anonymity of a routing protocol is to be achieved if the identities of end users are unlikable to data packets. According to this definition, a UC-style ideal functionality for route discovery process and the one for data transmission process are defined respectively. The route discovery process is modified to get private paths by generating UC-secure session-keys, which realizes the ideal functionality for route discovery. Then, verifiable lightweight route onions are constructed to realize the ideal functionality for data transmission, i.e., the route onions can verify that upstream nodes shuffle data packets correctly and downstream paths are intact. Finally, the anonymity of the improved protocol is proved in the universal composition framework. The methodology used is also suitable for designing and analyzing other anonymous routing protocols in wireless networks.
  • Related Articles

    [1]Wang Wenbin, Sun Qibo, and Yang Fangchun. Environment-Aware Quantitative Assessment Model for Service Availability in MANET[J]. Journal of Computer Research and Development, 2012, 49(3): 558-564.
    [2]Ma Chi, Li Zhi, Zhang Hong, and Liu Fengyu. Survivability Research on the Impact of Node Failure in MANET[J]. Journal of Computer Research and Development, 2012, 49(3): 550-557.
    [3]Zhang Yanqing, Li Jinbao, and Guo Longjiang. Cache-Based Mobile Data Query Processing Algorithm in MANET[J]. Journal of Computer Research and Development, 2011, 48(10): 1899-1907.
    [4]Huang Qingyuan, Zeng Yingzhi, and Su Jinshu. ASR: An Adaptive Secure Routing Protocol in MANET[J]. Journal of Computer Research and Development, 2008, 45(12): 2087-2094.
    [5]Ye Ayong, Ma Jianfeng. A Trust Valuation Model in MANET[J]. Journal of Computer Research and Development, 2008, 45(5): 765-771.
    [6]Chen Wei, Long Xiang, Gao Xiaopeng, and Bai Yuebin. A Novel Gray Hole Attack Detection Scheme for Mobile Ad-Hoc Networks[J]. Journal of Computer Research and Development, 2007, 44(8): 1371-1377.
    [7]Hu Huaping, Hu Guangming, Dong Pan, Chen Xin. Survey of Security Technology for Large Scale MANET[J]. Journal of Computer Research and Development, 2007, 44(4): 545-552.
    [8]Gao Zhenguo, Cai Shaobin, Zhao Yunlong. Analytical Expressions of Properties of MANETs Uniformly Distributed in Rectangular Area[J]. Journal of Computer Research and Development, 2006, 43(12): 2056-2061.
    [9]An Huiyao, Lu Xicheng, Peng Wei, Gong Zhenghu. A Cluster-Based Multipath Dynamic Source Routing in MANET[J]. Journal of Computer Research and Development, 2006, 43(3): 381-388.
    [10]Wen Yingyou, Zhao Jianli, Zhao Linliang, and Wang Guangxing. A Study of the Relationship Between Performance of Topology-Based MANET Routing Protocol and Network Coverage Density[J]. Journal of Computer Research and Development, 2005, 42(4): 684-689.

Catalog

    Article views (652) PDF downloads (401) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return