Abstract
We propose a new anonymous multicast protocol named Encryption and Pseudo-based Anonymous Multicast Protocol (EPAMP). EPAMP is an anonymous routing protocol based on MAODV in mobile ad hoc networks. It adopts the pseudonym mechanism to hide the senders identity, and uses encryption/decryption mechanism to thwart eavesdropping and intrusion attacks. It can ensure the anonymity of senders, receivers and the communication of neighboring nodes. Performance analysis and simulation results indicate that EPAMP can ensure anonymity performance, and effectively resist collusion attacks and predecessor attacks. It brings only slight transmission delay and decrease in packet transmission rate.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Zhu, B., Wna, Z., Kankanhalli, M.S., Deng, R.H.: Anonymous secure routing in mobile ad-hoc networks. In: The Proceedings of 29th Annual IEEE International Conference on Local Computer Networks, pp. 102–108. IEEE (2012)
Hong, X., Kong, J., Gerla, M.: Mobility changes anonymity: new passive threats in mobile ad hoc networks. Wirel. Commun. Mob. Comput. 6(3), 281–293 (2012)
Kong, J., Hong, X., Gerla, M.: An identity-free and on demand routing scheme against anonymity threats in mobile ad-hoc networks. IEEE Trans. Mob. Comput. 6(8), 888–902 (2007)
Zhang, Z., Liu, W., Fang, Y.: MASK: anonymous on-demand routing in mobile ad hoc networks. IEEE Trans. Wirel. Commun. 5, 2376–2385 (2006)
Boukerche, A., El-Khatib, K., Xu, L., et al.: SDAR: a secure distributed anonymous routing protocol for wireless and mobile ad hoc networks. In: The Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks, pp: 618–624 (2004)
Zhang, R., Zhang, Y., Fang, Y.: AOS: an anonymous overlay system for mobile ad hoc networks. Wirel. Netw. 17(4), 843–859 (2011)
Zhang. P, Jiang. Y.X., Lin. C.: P-Coding: secure network coding against eavesdropping attacks, pp. 1–9. IEEE (2010)
Weiler, N.: Secure anonymous group infrastructure for common and future internet applications. In: The Proceedings of the 17th Annual Computer Security Applications Conference, New Orleans, Louisiana, pp. 401–410 (2001)
Bao-liu, Y., Tie-cheng, G., Min-qiang, W., et al.: Mapper: a multicast-based peer-to-peer file anonymous retrieval protocol. Acta Electronica Sinica 32(5), 754–758 (2004)
Oliveira, L.B., Aranha, D.F., Gouva, C.P.L., et al.: TinyPBC: pairings for authenticated identity-based non-interactive key distribution in sensor networks. Comput. Commun. 34(3), 485–493 (2010)
Perng, G., Reiter, M., Wang, C.: M2: multicasting mixes for efficient and anonymous communication. In: The Proceedings of 26th IEEE International Conference on Distributed Computing Systems, pp: 59–69 (2006)
Xiao, L., Liu, X., Gu, W., et al.: A design of overlay anonymous multicast protocol. In: The Proceedings of Parallel and Distributed Processing Symposium (IPDPS), pp. 1–10 (2006)
Wang, J., Niu, C., Shen, R.: Bus-based anonymous mulitcast in peer-to-peer overlay. In: The Proceedings of International Conference on Network and Parallel Computing - Workshops, Dalian, China, pp:148–151 (2007)
Wright, M., Adler, M., Levine, B., et al.: An analysis of the degradation of anonymous protocols. In: The Proceedings of Network and Distributed System Security Symposium, San Diego, California, pp. 34–43 (2002)
Acknowledgements
This research was supported in part by the National Nature Science Foundation of China under Grant No. 61173169. The authors would like to thank the anonymous reviewers for their valuable comments.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Xiao, H., Song, H., Wang, W. (2015). EPAMP: An Anonymous Multicast Protocol in Mobile Ad Hoc Networks. In: Wang, G., Zomaya, A., Martinez, G., Li, K. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2015. Lecture Notes in Computer Science(), vol 9532. Springer, Cham. https://doi.org/10.1007/978-3-319-27161-3_24
Download citation
DOI: https://doi.org/10.1007/978-3-319-27161-3_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-27160-6
Online ISBN: 978-3-319-27161-3
eBook Packages: Computer ScienceComputer Science (R0)