2015 10th Asia Joint Conference on Information Security 2015
DOI: 10.1109/asiajcis.2015.27
|View full text |Cite
|
Sign up to set email alerts
|

Hash-Based Anonymous Secure Routing Protocol in Mobile Ad Hoc Networks

Abstract: A mobile ad hoc network (MANET) is composed of multiple wireless mobile devices in which an infrastructureless network with dynamic topology is built based on wireless communication technologies. Novel applications such as locationbased services and personal communication Apps used by mobile users with handheld wireless devices utilize MANET environments. In consequence, communication anonymity and message security have become critical issues for MANET environments. In this study, a novel secure routing protoc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 26 publications
(42 reference statements)
0
4
0
Order By: Relevance
“…The game plays between Challenger C and A I or A II until C derives the solution to the CDH problem based on the interaction results, breaking the security assumption of the CDH problem. According to the security proof requirements shown in references [13], [19], attackers A I and A II can adaptively perform various queries such as random oracle query, partial private key extraction, public key request, private key extraction, and decryption query. C will respond to these queries according to the distribution of responses in real attacks.…”
Section: Security Proofmentioning
confidence: 99%
See 1 more Smart Citation
“…The game plays between Challenger C and A I or A II until C derives the solution to the CDH problem based on the interaction results, breaking the security assumption of the CDH problem. According to the security proof requirements shown in references [13], [19], attackers A I and A II can adaptively perform various queries such as random oracle query, partial private key extraction, public key request, private key extraction, and decryption query. C will respond to these queries according to the distribution of responses in real attacks.…”
Section: Security Proofmentioning
confidence: 99%
“…In 2015, Lo et al presented a new anonymous secure communication routing protocol (HASR. HASR can implement anonymous communication in Mobile Ad hoc network (MANET) environment [19]. Routing efficiency is improved by omitting a separate anonymous communication link establishment process, but messages security is difficult to guarantee.…”
Section: Introductionmentioning
confidence: 99%
“…This type of attack is done by changing some of the control information or metrics of routing. Impersonation is another type of attack wherein malicious node use identity belonging to other nodes to initiate attacks [20][21][22]. There are different security mechanisms to address the malicious or adversarial nodes [23]: a) Preventive Mechanism This mechanism works as a defense technique by applying encryption and authentication schemes.…”
Section: Introductionmentioning
confidence: 99%
“…HASR (Hash-based Anonymous Secure Routing) [13] uses collision resistant one-way hash function and pseudo name generation mechanism similar to AODV. HASR does not apply cryptography on data or key.…”
Section: Manetmentioning
confidence: 99%