2009
DOI: 10.1007/978-3-642-05284-2_21
|View full text |Cite
|
Sign up to set email alerts
|

Self-organized Anonymous Authentication in Mobile Ad Hoc Networks

Abstract: Abstract. Pervasive communications bring along new privacy challenges, fueled by the capability of mobile devices to communicate with, and thus "sniff on", each other directly. We design a new mechanism that aims at achieving location privacy in these forthcoming mobile networks, whereby mobile nodes collect the pseudonyms of the nodes they encounter to generate their own privacy cloaks. Thus, privacy emerges from the mobile network and users gain control over the disclosure of their locations. We call this ne… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 34 publications
(44 reference statements)
0
3
0
Order By: Relevance
“…Similary, Ring signatures [49] allow to sign on behalf of an ad hoc group of nodes without the help of a central coordinator. However, the location privacy provided by ring signatures is still an open problem [23]. Anonymous credential systems (e.g., Idemix [12]) allow mobile nodes to anonymously authenticate to third parties with the help of an online credential issuer.…”
Section: Related Workmentioning
confidence: 99%
“…Similary, Ring signatures [49] allow to sign on behalf of an ad hoc group of nodes without the help of a central coordinator. However, the location privacy provided by ring signatures is still an open problem [23]. Anonymous credential systems (e.g., Idemix [12]) allow mobile nodes to anonymously authenticate to third parties with the help of an online credential issuer.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, the threshold signature scheme is necessary for secure message transmission in MANETs. A recent research on cluster-based MANETs has sought to address the privacy problem [6] and threshold signature schemes [7], but research on anonymous threshold signature schemes in cluster-based MANETs has been insufficient. This paper proposes a security system for ID-based anonymous cluster-based MANETs to protect the privacy of nodes.…”
Section: Introductionmentioning
confidence: 99%
“…Such a work provides simulation data, like [5], but the shown results are only described in a superficial way, with no images. Other schemes based on threshold cryptography and ring signatures are surveyed in [2], [9] but the same situation is repeated.…”
Section: Introductionmentioning
confidence: 99%