2010 International Conference on Measuring Technology and Mechatronics Automation 2010
DOI: 10.1109/icmtma.2010.602
|View full text |Cite
|
Sign up to set email alerts
|

Anonymous Multipath Routing Protocol Based on Secret Sharing in Mobile Ad Hoc Networks

Abstract: For the intrinsic characteristics cause several vulnerabilities of MANET, anonymous routing protocol attracts much more attention in secure mobile ad hoc networks for the purposes of security and privacy concerns. Until recently, lots of anonymous routing protocols have been proposed. However, most of them are single path or use one path at a time or can not thwart both the passive attacks and active attacks simultaneously. Thus, we propose an anonymous multipath routing protocol based on secret sharing. The p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…Data anonymization is widely used method for safeguarding data against undesired leakage [6] [8]. [6] uses cryptographic techniques and secret sharing to provide identity, location, traffic and data anonymity. [8] presents a data-centric trust, where trust in each individual piece of data is computed; then multiple, related but possibly contradictory, data are combined.…”
Section: Some Of the Existing Workmentioning
confidence: 99%
“…Data anonymization is widely used method for safeguarding data against undesired leakage [6] [8]. [6] uses cryptographic techniques and secret sharing to provide identity, location, traffic and data anonymity. [8] presents a data-centric trust, where trust in each individual piece of data is computed; then multiple, related but possibly contradictory, data are combined.…”
Section: Some Of the Existing Workmentioning
confidence: 99%
“…MASK [54] and D-ANODR [52] contain the final destination in the clear in each RREQ message. AMRSS [14] and ARMR [17] utilizes multiple paths for routing. AMRSS [14] assumes that the entire network shares a pair of public-private keys and that the destination ID will be encrypted using such a key.…”
Section: Related Workmentioning
confidence: 99%
“…AMRSS [14] and ARMR [17] utilizes multiple paths for routing. AMRSS [14] assumes that the entire network shares a pair of public-private keys and that the destination ID will be encrypted using such a key. AMRSS also includes the entire path encrypted under the network key in each data message.…”
Section: Related Workmentioning
confidence: 99%
“…Parakh and Kak [24] proposed a space efficient SS scheme, in which k secrets can be divided into n shares, where k ≤ n. Their method can be used for secure parallel communication and online data storage. Chen and Wu [25] presented an anonymous multipath routing protocol based on SS in mobile ad hoc networks. The protocol can provide high security by preventing passive attacks and reduce the successful probability of active attacks.…”
Section: Introductionmentioning
confidence: 99%