Font Size: a A A

Research On The Anonymous Communications In Wireless Ad Hoc Networks

Posted on:2009-06-19Degree:MasterType:Thesis
Country:ChinaCandidate:S S ChenFull Text:PDF
GTID:2178360245985003Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
Ad Hoc networks have attracted more and more attentions recently due to its flexibility and self-organization. However, Ad Hoc networks are easier to be attacked because of its features compared to the conventional networks. So, the security project is the critical important research problem of the Ad Hoc networks. Generally, the security mechanisms of the Ad Hoc networks are to ensure the confidentiality, integrity and availability of the message. Recently, researchers study the security technique which accomplishes privacy protection of networks, called anonymous communication technique.The privacy protection of Ad Hoc networks includes information privacy, identity privacy, location privacy and topology privacy. This dissertation studies how to accomplish above privacy protections in different application situations. Firstly, aiming to accomplish the identity privacy in some application situations, such as anonymous E-vote, anonymous E-commerce, anonymous E-auction, anonymity conference and so on, we propose a secure identity anonymity scheme for anonymous communication. Secondly, it studies how to accomplish identity privace, location privace and topology privacy all together, because it is not enough to only protect the identity information in some application situations of Ad Hoc networks like military field. The location and topology information are also very important in such hostile environment. This part includes two research points. On one hand, we study the pseudonym mechanism for the Ad Hoc networks and present a identity-based cryptograph based pseudonym scheme, which provides the mechanism to administer the anomymity network. And we also propose a signature scheme based above pseudonym for the anonymous communication in Ad Hoc networks. On an other hand, we extend the dynamic source routing protocol DSR to be a secure and anonymous routing protocol named SADSR based on the above pseudonym scheme. We not only gave out the security and anonymity analysis of the SADSR in theory, but also simulated the routing protocol in the NS-2.
Keywords/Search Tags:Ad Hoc networks, Anonymous communication, Identity anonymous, Pseudonym, Secure routing protocol, Anonymous routing protocol
PDF Full Text Request
Related items