Weitere Artikel dieser Ausgabe durch Wischen aufrufen
Source privacy plays a key role in communication infrastructure protection. It is a critical security requirement for many mission critical communications. This is especially true for mobile ad hoc networks (MANETs) due to node mobility and lack of physical protection. Existing cryptosystem-based techniques and broadcasting-based techniques cannot be easily adapted to MANET because of their extensive cryptographic computation and/or large communication overhead. In this paper, we first propose a novel unconditionally secure source anonymous message authentication scheme (SAMAS). This scheme enables message sender to transmit messages without relying on any trusted third parties. While providing source privacy, the proposed scheme can also provide message content authenticity. We then propose a novel communication protocol for MANET that can ensure communication privacy for both message sender and message recipient. This protocol can also protect end-to-end routing privacy. Our security analysis demonstrates that the proposed protocol is secure against various attacks. The theoretical analysis and simulation show that the proposed scheme is efficient and can provide high message delivery ratio. The proposed protocol can be used for critical infrastructure protection and secure file sharing in mobile ad hoc networks where dynamic groups can be formed.
Chaum D: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 1981, 24: 84-88. 10.1145/358549.358563 CrossRef
Reed M, Syverson P, Goldschlag D: Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communications 1998, 16(4):482-494. 10.1109/49.668972 CrossRef
von Ahn L, Bortz A, Hopper N: -anonymous message transmission. Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), October 2003, Washingtion, DC, USA 122-130.
Berthold O, Federrath H, Köpsell S: Web MIXes: a system for anonymous and unobservable internet access. Proceedings of the Workshop on Design Issues in Anonymity and Unobservability, 2001, Lecture Notes in Computer Science 2248: 115-129.
Danezis G, Dingledine R, Mathewson N: Mixminion: design of a type III anonymous remailer protocol. Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, May 2003, Oakland, Calif, USA 2-15.
Gülcü C, Tsudik G: Mixing email with babel. Proceedings of the Symposium on Network and Distributed System Security, February 1996, San Diego, Calif, USA
Möller U, Cottrell L, Palfrader P, Sassaman L: Mixmaster protocol. Version 2, July 2003
Reiter M, Rubin A: Crowds: anonymity for web transaction. ACM Transactions on Information and System Security 1998, 1(1):66-92. 10.1145/290163.290168 CrossRef
Goel S, Robson M, Polte M, Sirer E: Herbivore: a scalable and efficient protocol for anonymous communication. Tech. Rep. 2003-1890, Cornell University, Ithaca, NY, USA; 2003.
Golle P, Juels A: Dining cryptographers revisited. Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt '04), May 2004, Interlaken, Switzerland, Lecture Notes in Computer Science 456-473.
Pfitzmann A, Hansen M: Anonymity, unlinkability, unobservability, pseudonymity, and identity management a proposal for terminology. February 2008, http://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.31.pdf
Pfitzmann A, Waidner M: Networks without user observability-design options. Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques (Eurocrypt '85), April 1985, Linz, Austria, Lecture Notes in Computer Science 219: 245-253.
Waidner M: Unconditional sender and recipient untraceability in spite of active attacks. Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques (Eurocrypt '89), April 1989, Houthalen, Belgium, Lecture Notes in Computer Science 434: 302-319.
Harn L, Xu Y: Design of generalised ElGamal type digital signature schemes based on discrete logarithm. Electronics Letters 1994, 30(24):2025-2026. 10.1049/el:19941398 CrossRef
Nyberg K, Rueppel RA: Message recovery for signature schemes based on the discrete logarithm problem. Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (Eurocrypt '95), May 1995, Saint-Malo, France, Lecture Notes in Computer Science 950: 182-193. MathSciNet
Möller B: Provably secure public-key encryption for length-preserving chaumian mixes. Proceedings of the Cryptographer's Track at the RSA Conference (CT-RSA '03), April 2003, San Francisco, Calif, USA, Lecture Notes in Computer Science 2612: 244-262.
Shields C, Levine BN: A protocol for anonymous communication over the Internet. In Proceedings of the 7th ACM Conference on Computer and Communication Security, November 2000, Athens, Greece. Edited by: Gritzalis D. ACM Press;
Rivest R, Shamir A, Tauman Y: How to leak a secret. In Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT '01), December 2001, Gold Coast, Australia, Lecture Notes in Computer Science. Volume 2248. Springer;
Pointcheval D, Stern J: Security proofs for signature schemes. Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT '96), May 1996, Saragossa, Spain, Lecture Notes in Computer Science 1070: 387-398. MathSciNet
Bellare M, Rogaway P: Random oracles are practical: a paradigm for designing efficient protocols. Proceedings of the 1st ACM Conference on Computer and Communications Security (CCS '93), November 1993, Fairfax, Va, USA 62-73. CrossRef
F. P. 180-1 : Secure hash standard. April 1995, http://www.itl.nist.gov/fipspubs/fips180-1.htm
Balfanz D, Durfee G, Shankar N, Smetters D, Staddon J, Wong HC: Secure handshakes from pairing-based key agreements. Proceedings of the IEEE Symposium on Security & Privacy, May 2003, Oakland, Calif, USA
- SPM: Source Privacy for Mobile Ad Hoc Networks
- Springer International Publishing
EURASIP Journal on Wireless Communications and Networking
Elektronische ISSN: 1687-1499
Neuer Inhalt/© ITandMEDIA, Best Practices für die Mitarbeiter-Partizipation in der Produktentwicklung/© astrosystem | stock.adobe.com