SPM: Source Privacy for Mobile Ad Hoc Networks

Source privacy plays a key role in communication infrastructure protection. It is a critical security requirement for many mission critical communications. This is especially true for mobile ad hoc networks (MANETs) due to node mobility and lack of physical protection. Existing cryptosystem-based te...

Full description

Bibliographic Details
Main Authors: Jian Ren, Yun Li, Tongtong Li
Format: Article
Language:English
Published: SpringerOpen 2010-01-01
Series:EURASIP Journal on Wireless Communications and Networking
Online Access:http://dx.doi.org/10.1155/2010/534712
id doaj-74ca9a5639234e119b0a1c32bc06a141
record_format Article
spelling doaj-74ca9a5639234e119b0a1c32bc06a1412020-11-25T01:00:28ZengSpringerOpenEURASIP Journal on Wireless Communications and Networking1687-14721687-14992010-01-01201010.1155/2010/534712SPM: Source Privacy for Mobile Ad Hoc NetworksJian RenYun LiTongtong LiSource privacy plays a key role in communication infrastructure protection. It is a critical security requirement for many mission critical communications. This is especially true for mobile ad hoc networks (MANETs) due to node mobility and lack of physical protection. Existing cryptosystem-based techniques and broadcasting-based techniques cannot be easily adapted to MANET because of their extensive cryptographic computation and/or large communication overhead. In this paper, we first propose a novel unconditionally secure source anonymous message authentication scheme (SAMAS). This scheme enables message sender to transmit messages without relying on any trusted third parties. While providing source privacy, the proposed scheme can also provide message content authenticity. We then propose a novel communication protocol for MANET that can ensure communication privacy for both message sender and message recipient. This protocol can also protect end-to-end routing privacy. Our security analysis demonstrates that the proposed protocol is secure against various attacks. The theoretical analysis and simulation show that the proposed scheme is efficient and can provide high message delivery ratio. The proposed protocol can be used for critical infrastructure protection and secure file sharing in mobile ad hoc networks where dynamic groups can be formed. http://dx.doi.org/10.1155/2010/534712
collection DOAJ
language English
format Article
sources DOAJ
author Jian Ren
Yun Li
Tongtong Li
spellingShingle Jian Ren
Yun Li
Tongtong Li
SPM: Source Privacy for Mobile Ad Hoc Networks
EURASIP Journal on Wireless Communications and Networking
author_facet Jian Ren
Yun Li
Tongtong Li
author_sort Jian Ren
title SPM: Source Privacy for Mobile Ad Hoc Networks
title_short SPM: Source Privacy for Mobile Ad Hoc Networks
title_full SPM: Source Privacy for Mobile Ad Hoc Networks
title_fullStr SPM: Source Privacy for Mobile Ad Hoc Networks
title_full_unstemmed SPM: Source Privacy for Mobile Ad Hoc Networks
title_sort spm: source privacy for mobile ad hoc networks
publisher SpringerOpen
series EURASIP Journal on Wireless Communications and Networking
issn 1687-1472
1687-1499
publishDate 2010-01-01
description Source privacy plays a key role in communication infrastructure protection. It is a critical security requirement for many mission critical communications. This is especially true for mobile ad hoc networks (MANETs) due to node mobility and lack of physical protection. Existing cryptosystem-based techniques and broadcasting-based techniques cannot be easily adapted to MANET because of their extensive cryptographic computation and/or large communication overhead. In this paper, we first propose a novel unconditionally secure source anonymous message authentication scheme (SAMAS). This scheme enables message sender to transmit messages without relying on any trusted third parties. While providing source privacy, the proposed scheme can also provide message content authenticity. We then propose a novel communication protocol for MANET that can ensure communication privacy for both message sender and message recipient. This protocol can also protect end-to-end routing privacy. Our security analysis demonstrates that the proposed protocol is secure against various attacks. The theoretical analysis and simulation show that the proposed scheme is efficient and can provide high message delivery ratio. The proposed protocol can be used for critical infrastructure protection and secure file sharing in mobile ad hoc networks where dynamic groups can be formed.
url http://dx.doi.org/10.1155/2010/534712
work_keys_str_mv AT jianren spmsourceprivacyformobileadhocnetworks
AT yunli spmsourceprivacyformobileadhocnetworks
AT tongtongli spmsourceprivacyformobileadhocnetworks
_version_ 1725213273676054528