A novel solution for protecting privacy in ad hoc network

Peng Xiong, Wei Zhang, Fu Ke Shen

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

Communicating nodes in a wireless and mobile ad hoc network usually seek the help of other intermediate nodes to get communicate channels. In such an open environment, malicious intermediate nodes can be a threat to the security and/or anonymity of the exchanged data between the mobile nodes. The main purposes of this work are to define more strict requirements on the anonymity and security properties of the routing protocol in ad hoc network, and propose a solution of achieving the goal. Our solution includes a mechanism to establish a trusted relation between all neighboring nodes and a secure routing protocol of protecting privacy. The routing protocol based on the mechanism can avoid untrustworthy nodes during his route discovery process and resist the attack of DoS. We present our scheme, and report on its performance using an extensive set of simulation set of experiments using GloMoSim simulator. Our results indicate clearly that protecting privacy can be achieved in mobile ad hoc network.

Original languageEnglish
Title of host publicationProceedings - ALPIT 2008, 7th International Conference on Advanced Language Processing and Web Information Technology
Pages404-411
Number of pages8
DOIs
StatePublished - 2008
EventALPIT 2008, 7th International Conference on Advanced Language Processing and Web Information Technology - Liaoning, China
Duration: 23 Jul 200825 Jul 2008

Publication series

NameProceedings - ALPIT 2008, 7th International Conference on Advanced Language Processing and Web Information Technology

Conference

ConferenceALPIT 2008, 7th International Conference on Advanced Language Processing and Web Information Technology
Country/TerritoryChina
CityLiaoning
Period23/07/0825/07/08

Keywords

  • Ad hoc
  • Denial of service(DOS)
  • Hash chain
  • Wireless network

Fingerprint

Dive into the research topics of 'A novel solution for protecting privacy in ad hoc network'. Together they form a unique fingerprint.

Cite this