Font Size: a A A

Research On Anonymous Secure Communications In Wireless Ad Hoc Networks

Posted on:2013-03-17Degree:MasterType:Thesis
Country:ChinaCandidate:H M FuFull Text:PDF
GTID:2248330371490123Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The wireless Ad-Hoc network is a kind of open, no-central, self-organizational, multi-hop network,which can be built anywhere at any time. Originally it was used for military research area, more and moreresearchers focus on its wide application prospects in the commercial and civil areas because of its flexibleand fast network constructing. However, due to the openness of the Ad Hoc network, dynamic topology,lack of centralized control and other characteristics, it is susceptible to a variety of network attacks, whichlimits the development of its applications, thus the security problem of the Ad Hoc network is an importantproblem in the study of the network. Now, many security researches of Ad Hoc network are absorbed inensuring that the information transmitted in the network are true and Integral and protecting the activeattacks in the networks, while ignoring the passive attack such as traffic analysis. Through the trafficanalysis of network, attacker can obtain the sensitive information of the main communication, thenthreaten the security of the entire network further. Anonymous communication technology can keepnetwork traffic behavior not to be observed and to be hidden, so as to prevent such passive attack, like thetraffic analysis.This paper focuses on the anonymous routing protocol of anonymous communication technology inWireless Ad Hoc Networks and proposes a secure anonymous routing protocol AASRP (for Ad Hoc theAnonymous Secure Routing Protocol). The protocol guarantees the anonymity of the identity of the nodesin the network, the anonymity of nodes location, and the anonymity of the transmission path to achieve thegoal of anonymous communication. Finally,this paper makes a simulation with NS-2network simulationsoftware to verify and analyze the feasibility of the theory compare it with the existing routing protocols.The main works and contributions of this paper are as follows:1. On the basis of the research on anonymous communication, this paper introduces a identity-basedkey management based pseudonym mechanisms according to the characteristics of Ad Hoc Networks. Themechanism reduces the system cost excessively, and, through authenticating the nodes in the networkthrough the trusted third party and providing a pseudonym set used to replace the true identity of the node.The nodes use a pseudonym instead of its true identity to take part in the activities of the network and realize the anonymity of the nodes. At the same time, it provides a secure foundation for theCommunications in Ad Hoc Networks.2. This paper designs a anonymous routing protocols AASRP (Ad Hoc Anonymous Secure RoutingProtocol)on the basis of a pseudonym mechanism. Utilizing the characteristics of the bilinear pairingfunctions and one-way HASH function, also through mutual anonymous authentication between theneighbor,this protocol builds up multiple anonymous link channel between the neighbors. The channelguarantees that the network routing information is well hidden and reduces the possibility that networkpackets are tracked. At the same time, through performing different levels of encryptions on the protocolaccording to different demands, the security of the system is guaranteed and the unnecessary expense isreduced. The results show that AASRP not only has good security, but also improves the system’sanonymity greatly and prevents passive aggressive such as traffic analysis.3.This paper performs simulation with NS-2network simulation software to verify the theory,analyzes and compares it with the existing routing protocols ANODR in such respects as routing overhead,packet delivery rate, packet end-to-end average delay and so on.The simulation shows that AASRP notonly achieves the secure anonymity, but also reduce the routing overhead.
Keywords/Search Tags:wireless Ad-Hoc network, Pseudonym mechanism, Anonymous routing, NS-2Simulate
PDF Full Text Request
Related items