DocumentCode :
1415517
Title :
ALARM: Anonymous Location-Aided Routing in Suspicious MANETs
Author :
El Defrawy, Karim ; Tsudik, Gene
Author_Institution :
Comput. Sci. Dept., Univ. of California, Irvine, Irvine, CA, USA
Volume :
10
Issue :
9
fYear :
2011
Firstpage :
1345
Lastpage :
1358
Abstract :
In most common mobile ad hoc networking (MANET) scenarios, nodes establish communication based on long-lasting public identities. However, in some hostile and suspicious settings, node identities must not be exposed and node movements should be untraceable. Instead, nodes need to communicate on the basis of their current locations. While such MANET settings are not very common, they do occur in military and law enforcement domains and require high security and privacy guarantees. In this paper, we address a number of issues arising in suspicious location-based MANET settings by designing and analyzing a privacy-preserving and secure link-state based routing protocol (ALARM). ALARM uses nodes´ current locations to securely disseminate and construct topology snapshots and forward data. With the aid of advanced cryptographic techniques (e.g., group signatures), ALARM provides both security and privacy features, including node authentication, data integrity, anonymity, and untraceability (tracking-resistance). It also offers protection against passive and active insider and outsider attacks. To the best of our knowledge, this work represents the first comprehensive study of security, privacy, and performance tradeoffs in the context of link-state MANET routing.
Keywords :
cryptographic protocols; data integrity; data privacy; mobile ad hoc networks; routing protocols; telecommunication security; ALARM; active insider attacks; active outsider attacks; anonymity; anonymous location-aided routing; cryptographic techniques; current node locations; data forwarding; data integrity; group signatures; link-state MANET routing; mobile ad hoc networking; node authentication; passive insider attacks; passive outsider attacks; privacy-preserving routing protocol; secure link-state based routing protocol; suspicious location-based MANET; topology snapshots; untraceability; Ad hoc networks; Cryptography; Mobile computing; Privacy; Protocols; Routing; Privacy; communication system routing; communication system security; location-based communication; military communication.; mobile communication;
fLanguage :
English
Journal_Title :
Mobile Computing, IEEE Transactions on
Publisher :
ieee
ISSN :
1536-1233
Type :
jour
DOI :
10.1109/TMC.2010.256
Filename :
5677545
Link To Document :
بازگشت