By Topic

Lightweight Privacy-Preserving and Secure Communication Protocol for Hybrid Ad Hoc Wireless Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Mahmoud, M.M.E.A. ; Dept. of Electr. & Comput. Eng., Tennessee Tech Univ., Cookeville, TN, USA ; Taha, S. ; Misic, J. ; Xuemin Shen

We propose lightweight protocol for securing communication and preserving users' anonymity and location privacy in hybrid ad hoc networks. Symmetric-key-cryptography operations and payment system are used to secure route discovery and data transmission. To reduce the overhead, the payment can be secured without submitting or processing payment proofs (receipts). To preserve users' anonymity with low overhead, we develop efficient pseudonym generation and trapdoor techniques that do not use the resource-consuming asymmetric-key cryptography. Pseudonyms do not require large storage area or frequently contacting a central unit for refilling. Our trapdoor technique uses only lightweight hashing operations. This is important because trapdoors may be processed by a large number of nodes. Developing low-overhead secure and privacy-preserving protocol is a real challenge due to the inherent contradictions: 1) securing the protocol requires each node to use one authenticated identity, but a permanent identity should not be used for privacy preservation; and 2) the low overhead requirement contradicts with the large overhead usually needed for preserving privacy and securing the communication. Our analysis and simulation results demonstrate that our protocol can preserve privacy and secure the communication with low overhead.

Published in:

Parallel and Distributed Systems, IEEE Transactions on  (Volume:25 ,  Issue: 8 )