|Table of Contents|

Energy Efficient Anonymous Routing Protocol for Ad Hoc NetworkBased on Zero Knowledge Proofs


Research Field:
Publishing date:


Energy Efficient Anonymous Routing Protocol for Ad Hoc NetworkBased on Zero Knowledge Proofs
LIU Fang-binLIU Feng-yuZHANG Hong
School of Computer Science and Engineering,NUST,Nanjing 210094,China
zero knowledge proofslow energy consumptionlow end-to-end delayanonymous routingad hoc network security
In order to reduce asymmetric encryption operations during the anonymous protocols estab-lishment,an energy efficient anonymous routing protocol based on zero knowledge proofs for mobilead hoc networks( ARZ) is proposed. ARZ uses zero knowledge proofs of authentication protocols toconstruct the trapdoor to reduce asymmetric encryption operations of the trapdoor decryption. Nodesexchange the secret information with each other in route reply phase. The protocol analysis andsimulation results prove that ARZ can reduce energy consumption efficiently under the samesecurity,anonymity and real-time.


[1]El-Khatib K, Korba L, Song R, et al. Secure dynamicdistributed routing algorithm for ad hoc wireless networks[A]. First International Workshop on Wireless Securityand Privacy 2003 [ C ]. Canada: NRC PublicationsArchive,2003:356-366.
[2] Kong J, Hong X, Gerla M. An identity-free and on-demand routing scheme against anonymity threats inmobile ad hoc networks [ J]. IEEE Transactions onMobile Computing,Frequency,2007,6(8):888-902.
[3] Boukerche A,El-Khatib K,Li X,et al. SDAR:A securedistributed anonymous routing protocol for wireless andmobile ad hoc networks[ A]. Proceedings of the 29thAnnual IEEE International Conference on LocalComputer Networks [ C ]. Washington, USA: IEEEComputer Society,2004:618-624.
[4] Song R,Korba L,Yee G. AnonDSR:Efficient anonymousdynamic source routing for mobile ad-hoc networks[ A]. Proceedings of the 2005 ACM Workshop onSecurity of Ad Hoc and Sensor Networks[C]. Canada:NRC Publication Archive,2005:32-42.
[5] Seys S,Preneel B. ARM:anonymous routing protocol formobile ad hoc networks [ J]. International Journal ofWireless and Mobile Computing,2009,3(3):145-155.
[6] Zhu B, Wan Z, Mohan S, et al. Anonymous securerouting in mobile ad-hoc networks[A]. Proceedings ofthe 29th Annual IEEE International Conference onLocal Computer Networks(LCN爷04)[C]. Washington,USA:IEEE Computer Society,2004:102-108.
[7] Kong J,Hong X. ANODR:Anonymous on demand routingwith untraceable routes for mobile ad-hoc networks[A].Proceedings of the 4th ACM International Symposium onMobile Ad Hoc Networking and Computing Table ofContents[C]. New York,USA:ACM New York,2003:291-302.
[8] Feige U,Fiat A,Shamir A. Zero knowledge proofs ofidentity [ A]. Proceedings of the Nineteenth AnnualACM Symposium on Theory of Computing [ C]. NewYork,USA:ACM New York,1987:210-217.
[9] 吴艳辉,王伟平,陈建二. 匿名通信研究综述[J]. 小型微型计算机系统,2007,28(4):583-588.Wu Yanhui, Wang Weiping, Chen Jianer. Anonymouscommunication: a survey [ J ]. Journal of ChineseComputer Systems,2007,28(4):583-588.
[10] Li X,Li H,Ma J,et al. An efficient anonymous routingprotocol for mobile ad hoc networks[ A]. InformationAssurance and Security,2009, the Fifth InternationalConference[C]. Xi爷an:IEEE Computer Society,2009:287-290.
[11] Mc C,Floyd S. Advances in Network Simulation[ EB/OL]. http:/ / www. isi. edu/ nsnam/ ,2010-06.
[12] Tomasz C,Zbigniew K. ANAP:Anonymous authenticationprotocol in mobile ad hoc networks[A]. Proceedings ofthe 10th Domestic Conference on Applied CryptographyENIGMA[C]. Warsaw,Poland:Eprint ArXiv,2006.
[13] Paik J, Kim B, Lee D. A3RP: Anonymous andauthenticated ad hoc routing protocol[A]. Proceedingsof the 2008 International Conference on InformationSecurity and Assurance [ C]. Brno, Czech Republic:IEEE Conference Publications,2008:67-72.


Last Update: 2012-11-26