Anonymous multipath routing protocol based on secret sharing in mobile ad hoc networks

来源 :Journal of Systems Engineering and Electronics | 被引量 : 0次 | 上传用户:zippomu
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Because the intrinsic characteristics of mobile ad hoc networks(MANETs) cause several vulnerabilities,anonymous routing protocols attract much more attention in secure mobile ad hoc networks for the purposes of security and privacy concerns.Until recently,lots of anonymous routing protocols have been proposed.However,most of them are single path or use one path at a time,and the multipath schemes can not thwart both the passive attacks and active attacks simultaneously.Thus an anonymous multipath routing protocol based on secret sharing is proposed.The protocol provides identity anonymity,location anonymity,data and traffic anonymity by employing cryptograph technology and secret sharing in MANET communication process.Meanwhile,a hash function is introduced to detect active attacks in the data transmission process.The protocol can effectively thwart various passive attacks and reduce the successful probability of active attacks(such as interception and physical destroy attacks).Simulation results show that the proposed scheme provides a reasonably good level of network security and performance. Because the intrinsic characteristics of mobile ad hoc networks (MANETs) cause several vulnerabilities, anonymous routing protocols attract much more attention in secure mobile ad hoc networks for the purposes of security and privacy concerns. Unauthorized recently, lots of anonymous routing protocols have been proposed. However, most of them are single path or use one path at a time, and the multipath schemes can not thwart both the passive attacks and active calls both. An anonymous multipath routing protocol based on secret sharing is proposed. The protocol provides identity anonymity , location anonymity, data and traffic anonymity by employing cryptograph technology and secret sharing in MANET communication process. While, a hash function is introduced to detect active attacks in the data transmission process. The protocol can effectively thwart various passive attacks and reduce the successful probability of active attacks (such as interception and physical destroy attacks) .Simulat ion results show that the proposed scheme provides a reasonably good level of network security and performance.
其他文献
目的 观察参附注射剂联合多巴胺治疗感染性休克患者的临床疗效,及对细胞免疫功能、心肌酶和细胞因子的影响.方法 选择2015年3月至2017年3月ICU收治的感染性休克患者82例,按照
提出对开发建设过程的水土流失的拟自然治理理念,研究以绿化混凝土技术,模拟自然的有益功能和效果,进行水土流失治理和生态修复,并结合在国内10余省市成功应用的实践,提供了
虚拟现实是一种具有很强的人机交互能力的现实模拟技术,通过生成一个非常逼真的虚拟环境,提高用户的认知能力,进而增强对现实信息的有效获取.本文通过在ERDASIMAGINE虚拟地理
会议
容忍入侵方法是以入侵带来的影响,即系统部件或功能的失败作为处理对象,且在入侵发生时屏蔽其对系统带来的影响,因此符合可生存性和信息保障的要求.本文介绍了容忍入侵的基本
会议
三峡库区资源环境及移民概况;加强水土治理,确保三峡库区移民安置和生态环境安全的措施:加强领导,制定规划;调整政策,加强监督;落实措施,确保实施.有关建议:进一步加大"两个
会议
目的 对利伐沙班与依诺肝素预防全髋关节置换术(THA)后深静脉血栓形成(DVT)的累积Meta分析,旨在评价两者的有效性和安全性.方法 检索The Cochrane Library、Web of Science、
目的评价银杏叶提取物片联合胞磷胆碱钠治疗脑白质疏松引起的认知障碍的临床效果及其可能机制。方法选取2015年1月至2017年1月经确诊为脑白质疏松合并认知障碍的82例患者,随
目的 分析多重耐药鲍曼不动杆菌(MDR-AB)感染患者预后的影响因素.方法 回顾性收集2017年1月至12月确诊为MDR-AB感染病例共102例,采用单因素分析和Logistic多因素回归分析影响
本文对我国信息安全标准体系的建设和方法具体进行了论述,分析了我国信息安全标准体系的建设现状.文章对照美国的信息系统安全标准体系,整理提出了目前我国信息系统网安全标
目的 提出一种基于伸缩移动窗口的拉曼光谱峰识别方法,并且将其应用到药品的真假判别中.方法 采用一阶导数和插值法构建伸缩移动窗口,在移动窗口的同时进行窗口内的峰识别,利