{"title":"General-purpose Identity Hiding Schemes for Ad-hoc Networks","authors":"Shushan Zhao, A. Aggarwal","doi":"10.1109/IUCE.2009.103","DOIUrl":null,"url":null,"abstract":"Identity disclosure is a security and privacy concern in mobile ad-hoc networks. Previous proposals suggest using anonymous routing protocols. These solutions are limited on certain routing protocols, and cannot be applied to higher layers. In this paper, we propose the requirements of an general-purpose identity hiding scheme, and present schemes based on popular cryptosystems: AES, RSA, and ElGamal. These schemes can be applied in network and above layers. These schemes also overcome the following drawbacks of previous anonymous routing protocols: pair-wise keys, and large amount of pseudonyms. Hence, the proposed schemes are more efficient and applicable.","PeriodicalId":153560,"journal":{"name":"2009 International Symposium on Intelligent Ubiquitous Computing and Education","volume":"121 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Symposium on Intelligent Ubiquitous Computing and Education","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IUCE.2009.103","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
Identity disclosure is a security and privacy concern in mobile ad-hoc networks. Previous proposals suggest using anonymous routing protocols. These solutions are limited on certain routing protocols, and cannot be applied to higher layers. In this paper, we propose the requirements of an general-purpose identity hiding scheme, and present schemes based on popular cryptosystems: AES, RSA, and ElGamal. These schemes can be applied in network and above layers. These schemes also overcome the following drawbacks of previous anonymous routing protocols: pair-wise keys, and large amount of pseudonyms. Hence, the proposed schemes are more efficient and applicable.