Skip to main content

EPAMP: An Anonymous Multicast Protocol in Mobile Ad Hoc Networks

  • Conference paper
  • First Online:
Algorithms and Architectures for Parallel Processing (ICA3PP 2015)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9532))

  • 1728 Accesses

Abstract

We propose a new anonymous multicast protocol named Encryption and Pseudo-based Anonymous Multicast Protocol (EPAMP). EPAMP is an anonymous routing protocol based on MAODV in mobile ad hoc networks. It adopts the pseudonym mechanism to hide the senders identity, and uses encryption/decryption mechanism to thwart eavesdropping and intrusion attacks. It can ensure the anonymity of senders, receivers and the communication of neighboring nodes. Performance analysis and simulation results indicate that EPAMP can ensure anonymity performance, and effectively resist collusion attacks and predecessor attacks. It brings only slight transmission delay and decrease in packet transmission rate.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zhu, B., Wna, Z., Kankanhalli, M.S., Deng, R.H.: Anonymous secure routing in mobile ad-hoc networks. In: The Proceedings of 29th Annual IEEE International Conference on Local Computer Networks, pp. 102–108. IEEE (2012)

    Google Scholar 

  2. Hong, X., Kong, J., Gerla, M.: Mobility changes anonymity: new passive threats in mobile ad hoc networks. Wirel. Commun. Mob. Comput. 6(3), 281–293 (2012)

    Article  Google Scholar 

  3. Kong, J., Hong, X., Gerla, M.: An identity-free and on demand routing scheme against anonymity threats in mobile ad-hoc networks. IEEE Trans. Mob. Comput. 6(8), 888–902 (2007)

    Article  Google Scholar 

  4. Zhang, Z., Liu, W., Fang, Y.: MASK: anonymous on-demand routing in mobile ad hoc networks. IEEE Trans. Wirel. Commun. 5, 2376–2385 (2006)

    Article  Google Scholar 

  5. Boukerche, A., El-Khatib, K., Xu, L., et al.: SDAR: a secure distributed anonymous routing protocol for wireless and mobile ad hoc networks. In: The Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks, pp: 618–624 (2004)

    Google Scholar 

  6. Zhang, R., Zhang, Y., Fang, Y.: AOS: an anonymous overlay system for mobile ad hoc networks. Wirel. Netw. 17(4), 843–859 (2011)

    Article  Google Scholar 

  7. Zhang. P, Jiang. Y.X., Lin. C.: P-Coding: secure network coding against eavesdropping attacks, pp. 1–9. IEEE (2010)

    Google Scholar 

  8. Weiler, N.: Secure anonymous group infrastructure for common and future internet applications. In: The Proceedings of the 17th Annual Computer Security Applications Conference, New Orleans, Louisiana, pp. 401–410 (2001)

    Google Scholar 

  9. Bao-liu, Y., Tie-cheng, G., Min-qiang, W., et al.: Mapper: a multicast-based peer-to-peer file anonymous retrieval protocol. Acta Electronica Sinica 32(5), 754–758 (2004)

    Google Scholar 

  10. Oliveira, L.B., Aranha, D.F., Gouva, C.P.L., et al.: TinyPBC: pairings for authenticated identity-based non-interactive key distribution in sensor networks. Comput. Commun. 34(3), 485–493 (2010)

    Article  Google Scholar 

  11. Perng, G., Reiter, M., Wang, C.: M2: multicasting mixes for efficient and anonymous communication. In: The Proceedings of 26th IEEE International Conference on Distributed Computing Systems, pp: 59–69 (2006)

    Google Scholar 

  12. Xiao, L., Liu, X., Gu, W., et al.: A design of overlay anonymous multicast protocol. In: The Proceedings of Parallel and Distributed Processing Symposium (IPDPS), pp. 1–10 (2006)

    Google Scholar 

  13. Wang, J., Niu, C., Shen, R.: Bus-based anonymous mulitcast in peer-to-peer overlay. In: The Proceedings of International Conference on Network and Parallel Computing - Workshops, Dalian, China, pp:148–151 (2007)

    Google Scholar 

  14. Wright, M., Adler, M., Levine, B., et al.: An analysis of the degradation of anonymous protocols. In: The Proceedings of Network and Distributed System Security Symposium, San Diego, California, pp. 34–43 (2002)

    Google Scholar 

Download references

Acknowledgements

This research was supported in part by the National Nature Science Foundation of China under Grant No. 61173169. The authors would like to thank the anonymous reviewers for their valuable comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hong Song .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Xiao, H., Song, H., Wang, W. (2015). EPAMP: An Anonymous Multicast Protocol in Mobile Ad Hoc Networks. In: Wang, G., Zomaya, A., Martinez, G., Li, K. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2015. Lecture Notes in Computer Science(), vol 9532. Springer, Cham. https://doi.org/10.1007/978-3-319-27161-3_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27161-3_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27160-6

  • Online ISBN: 978-3-319-27161-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics