[1]刘方斌,刘凤玉,张宏.基于零知识证明的低能耗Ad Hoc 网络匿名路由协议[J].南京理工大学学报(自然科学版),2012,36(05):879.
 LIU Fang-bin,LIU Feng-yu,ZHANG Hong.Energy Efficient Anonymous Routing Protocol for Ad Hoc NetworkBased on Zero Knowledge Proofs[J].Journal of Nanjing University of Science and Technology,2012,36(05):879.
点击复制

基于零知识证明的低能耗Ad Hoc 网络匿名路由协议
分享到:

《南京理工大学学报》(自然科学版)[ISSN:1005-9830/CN:32-1397/N]

卷:
36卷
期数:
2012年05期
页码:
879
栏目:
出版日期:
2012-10-31

文章信息/Info

Title:
Energy Efficient Anonymous Routing Protocol for Ad Hoc NetworkBased on Zero Knowledge Proofs
作者:
刘方斌刘凤玉张宏
南京理工大学计算机科学与工程学院,江苏南京210094
Author(s):
LIU Fang-binLIU Feng-yuZHANG Hong
School of Computer Science and Engineering,NUST,Nanjing 210094,China
关键词:
零知识证明低能耗低时延匿名路由自组织网络安全
Keywords:
zero knowledge proofslow energy consumptionlow end-to-end delayanonymous routingad hoc network security
分类号:
TP309;TP393
摘要:
为降低匿名路由协议中公钥运算量,提出基于零知识证明的低能耗自组织(Ad Hoc)网络匿名路由协议(ARZ)。协议通过将零知识证明验证协议应用于陷门的构造中,减少了解陷门所需的大量公钥操作;将节点协商秘密信息工作转移到路由应答阶段,减少了协商密钥时的公钥操作量。协议分析和实验结果表明,ARZ 在保证不降低安全性和匿名性的前提下,大幅减少了公钥运算量,降低了节点能源消耗和路由建立时延。
Abstract:
In order to reduce asymmetric encryption operations during the anonymous protocols estab-lishment,an energy efficient anonymous routing protocol based on zero knowledge proofs for mobilead hoc networks( ARZ) is proposed. ARZ uses zero knowledge proofs of authentication protocols toconstruct the trapdoor to reduce asymmetric encryption operations of the trapdoor decryption. Nodesexchange the secret information with each other in route reply phase. The protocol analysis andsimulation results prove that ARZ can reduce energy consumption efficiently under the samesecurity,anonymity and real-time.

参考文献/References:

[1]El-Khatib K, Korba L, Song R, et al. Secure dynamicdistributed routing algorithm for ad hoc wireless networks[A]. First International Workshop on Wireless Securityand Privacy 2003 [ C ]. Canada: NRC PublicationsArchive,2003:356-366.
[2] Kong J, Hong X, Gerla M. An identity-free and on-demand routing scheme against anonymity threats inmobile ad hoc networks [ J]. IEEE Transactions onMobile Computing,Frequency,2007,6(8):888-902.
[3] Boukerche A,El-Khatib K,Li X,et al. SDAR:A securedistributed anonymous routing protocol for wireless andmobile ad hoc networks[ A]. Proceedings of the 29thAnnual IEEE International Conference on LocalComputer Networks [ C ]. Washington, USA: IEEEComputer Society,2004:618-624.
[4] Song R,Korba L,Yee G. AnonDSR:Efficient anonymousdynamic source routing for mobile ad-hoc networks[ A]. Proceedings of the 2005 ACM Workshop onSecurity of Ad Hoc and Sensor Networks[C]. Canada:NRC Publication Archive,2005:32-42.
[5] Seys S,Preneel B. ARM:anonymous routing protocol formobile ad hoc networks [ J]. International Journal ofWireless and Mobile Computing,2009,3(3):145-155.
[6] Zhu B, Wan Z, Mohan S, et al. Anonymous securerouting in mobile ad-hoc networks[A]. Proceedings ofthe 29th Annual IEEE International Conference onLocal Computer Networks(LCN爷04)[C]. Washington,USA:IEEE Computer Society,2004:102-108.
[7] Kong J,Hong X. ANODR:Anonymous on demand routingwith untraceable routes for mobile ad-hoc networks[A].Proceedings of the 4th ACM International Symposium onMobile Ad Hoc Networking and Computing Table ofContents[C]. New York,USA:ACM New York,2003:291-302.
[8] Feige U,Fiat A,Shamir A. Zero knowledge proofs ofidentity [ A]. Proceedings of the Nineteenth AnnualACM Symposium on Theory of Computing [ C]. NewYork,USA:ACM New York,1987:210-217.
[9] 吴艳辉,王伟平,陈建二. 匿名通信研究综述[J]. 小型微型计算机系统,2007,28(4):583-588.Wu Yanhui, Wang Weiping, Chen Jianer. Anonymouscommunication: a survey [ J ]. Journal of ChineseComputer Systems,2007,28(4):583-588.
[10] Li X,Li H,Ma J,et al. An efficient anonymous routingprotocol for mobile ad hoc networks[ A]. InformationAssurance and Security,2009, the Fifth InternationalConference[C]. Xi爷an:IEEE Computer Society,2009:287-290.
[11] Mc C,Floyd S. Advances in Network Simulation[ EB/OL]. http:/ / www. isi. edu/ nsnam/ ,2010-06.
[12] Tomasz C,Zbigniew K. ANAP:Anonymous authenticationprotocol in mobile ad hoc networks[A]. Proceedings ofthe 10th Domestic Conference on Applied CryptographyENIGMA[C]. Warsaw,Poland:Eprint ArXiv,2006.
[13] Paik J, Kim B, Lee D. A3RP: Anonymous andauthenticated ad hoc routing protocol[A]. Proceedingsof the 2008 International Conference on InformationSecurity and Assurance [ C]. Brno, Czech Republic:IEEE Conference Publications,2008:67-72.

备注/Memo

备注/Memo:
收稿日期:2011-10-18修回日期:2012-04-10作者简介:刘方斌(1985-),男,博士生,主要研究方向:无线网络安全,E-mail:nj_lfb@ 163. com;通讯作者:张宏(1956-),男,教授,博士生导师,主要研究方向:网络安全,数据挖掘,E-mail:zhhong@ njust. edu. cn。
更新日期/Last Update: 2012-11-26