Skip to main content

A Secure Privacy-Preserving Hierarchical Location Service for Mobile Ad Hoc Networks

  • Conference paper
Mobile Ad-Hoc and Sensor Networks (MSN 2007)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4864))

Included in the following conference series:

  • 1009 Accesses

Abstract

Recently, position-based routing has proven to be a scalable and efficient way for packet routing in mobile ad hoc networks. To enable position-based routing, a node must be able to discover the location of the intended destination node. This can typically be accomplished by a location service. By far there have been many efficient location service algorithms such as the DREAM, RLS, Homezone, GLS, DLM and HLS, but most of them have focused on the scalability and efficiency of algorithm while the security and privacy issues were vastly neglected. In this article, we propose a secure privacy-preserving hierarchical location service (SPPHLS) based on the HLS algorithm using the broadcast encryption scheme and broadcast authentication scheme. In the proposed secure location service scheme, the position privacy of nodes is protected and the security is promised. Finally, through simulation and analysis, we further show that the proposed scheme only introduces very moderate success rate degradation and query delay compared to the original HLS algorithm.

This work is supported by Tianjin Informatization Foundation under grant No. 061084012 and Microsoft Research Asia Trustworthy Computing Research.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Karp, B.N., Kung, H.T.: GPSR: Greedy Perimeter Stateless Routing for Wireless Networks. In: MobiCom 2000. Proceedings of the sixth annual ACM/IEEE International Conference on Mobile computing and networking, Boston, Massachusetts, pp. 243–254 (August 2000)

    Google Scholar 

  2. Mauve, M., Widmer, J., Hartenstein, H.: A survey on position-based routing in mobile ad hoc networks. IEEE Network Magazine 15(6), 30–39 (2001)

    Article  Google Scholar 

  3. Camp, T., Boleng, J., Wilcox, L.: Location Information Services in Mobile Ad Hoc Networks. In: Proc. of IEEE ICC 2002, New York City, New York, pp. 3318–3324 (April 2002)

    Google Scholar 

  4. Li, J., Jannotti, J., DeCouto, D.S.J., Karger, D.R., Morris, R.: A Scalable Location Service for Geographic Ad Hoc Routing. In: MobiCom 2000. Proceedings of the sixth annual ACM/IEEE International Conference on Mobile computing and networking, Boston, Massachusetts, pp. 120–130 (August 2000)

    Google Scholar 

  5. Xue, Y., Li, B., Nahrstedt, K.: A scalablelocation management scheme in mobile ad-hoc networks. In: LCN’2001. Proc. of the IEEE Conference on Local Computer Networks, Tampa, Florida (November 2001)

    Google Scholar 

  6. Kieβ, W., Füβler, H., Widmer, J., Mauve, M.: Hierarchical location service for mobile ad-hoc networks. ACM SIGMOBILE Mobile Computing and Communications Review 8(4), 47–58 (2004)

    Article  Google Scholar 

  7. Song, J.-H., Wong, V.W.S., Leung, V.C.M.: A framework of secure location service for position-based ad hoc routing. In: Proceedings of the 1st ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks, Venezia, Italy, pp. 99–106 (2004)

    Google Scholar 

  8. Zhi, Z., Choong, Y.K.: Anonymizing Geographic Ad Hoc Routing for Preserving Location Privacy. In: ICDCSW 2005. Proceedings of the Third International Workshop on Mobile Distributed Computing (MDC), vol. 06 (2005)

    Google Scholar 

  9. Tan, Z.W., Liu, Z.J., Xiao, H.G.: A fully public key tracing and revocation scheme provably secure against adaptive adversary. Journal of Software 16(7), 1333–1343 (2005)

    Article  MATH  Google Scholar 

  10. Chang, S.-M., Shieh, S., Lin, W.W., Hsieh, C.-M.: An efficient broadcast authentication scheme in wireless sensor networks. In: ASIACCS 2006, Taipei, Taiwan (March 21-24, 2006)

    Google Scholar 

  11. The ns-2 network simulator, http://www.isi.-edu/nsnam/ns/

  12. Royer, E.M., Melliar-Smith, P.M., Moser, L.E.: An Analysis of the Optimum Node Densityfor Ad hoc Mobile Networks. In: Proceedings of the IEEE International Conference on Communications, Helsinki, Finland (June 2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Hongke Zhang Stephan Olariu Jiannong Cao David B. Johnson

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ruan, X., Yu, B., Xu, J., Yang, L. (2007). A Secure Privacy-Preserving Hierarchical Location Service for Mobile Ad Hoc Networks. In: Zhang, H., Olariu, S., Cao, J., Johnson, D.B. (eds) Mobile Ad-Hoc and Sensor Networks. MSN 2007. Lecture Notes in Computer Science, vol 4864. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77024-4_69

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-77024-4_69

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77023-7

  • Online ISBN: 978-3-540-77024-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics