Wan et al., 2009 - Google Patents
Anonymous user communication for privacy protection in wireless metropolitan mesh networksWan et al., 2009
- Document ID
- 8803544150934546156
- Author
- Wan Z
- Ren K
- Zhu B
- Preneel B
- Gu M
- Publication year
- Publication venue
- Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
External Links
Snippet
Wireless mesh network (WMN) provides a low-cost, convenient solution to the last-mile network connectivity problem. As such, existing route protocols designed to provide security and privacy protection for ad hoc networks are not applicable in WMNs anymore. In this …
- 238000004891 communication 0 title description 36
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/065—Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0827—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving distinctive intermediate devices or communication paths
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/104—Grouping of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/164—Implementing security features at a particular protocol layer at the network layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
- H04L63/205—Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/162—Implementing security features at a particular protocol layer at the data link layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Vinayakan et al. | Security Mandated Analytics based Route Processing with Digital Signature [SMARPDS]-Pseudonymous Mobile Ad Hoc Routing Protocol | |
| Mick et al. | LASeR: Lightweight authentication and secured routing for NDN IoT in smart cities | |
| Qiu et al. | A mutual authentication and key establishment scheme for M2M communication in 6LoWPAN networks | |
| Zhang et al. | Anonymous communications in mobile ad hoc networks | |
| CN102098318B (en) | Method for performing end-to-end anonymity safety communication of hop network | |
| Mahmoud et al. | Lightweight privacy-preserving and secure communication protocol for hybrid ad hoc wireless networks | |
| Wu et al. | Achieving privacy in mesh networks | |
| Chen et al. | Anonymous multipath routing protocol based on secret sharing in mobile ad hoc networks | |
| Wan et al. | Anonymous user communication for privacy protection in wireless metropolitan mesh networks | |
| Othmen et al. | Anonymous and secure on-demand routing protocol for multi-hop cellular networks | |
| Sharma et al. | A security architecture for attacks detection and authentication in wireless mesh networks | |
| Zemmoudj et al. | Securing D2D Therapeutic Hiking Group in 5G Networks for Partial Coverage Scenario | |
| Imran et al. | DD-SARP: Dynamic data secure Anonymous Routing Protocol for MANETs in attacking environments | |
| Ravilla et al. | Performance of secured zone routing protocol due to the effect of malicious nodes in MANETs | |
| Augustine | A study of efficient anonymous routing protocols in MANET | |
| Dang et al. | Dasr: distributed anonymous secure routing with good scalability for mobile ad hoc networks | |
| Sagheer et al. | Identity Based Cryptography for secure AODV routing protocol | |
| Varaprasad et al. | New security algorithm for mobile adhoc networks using zonal routing protocol | |
| Qian et al. | Secure anonymous routing in clustered multihop wireless ad hoc networks | |
| Ramya et al. | Secured identity based routing and privacy preservation in wireless mesh networks | |
| Fathi et al. | Protocols for purpose-restricted anonymous communications in IP-based wireless networks | |
| Li et al. | Secure anonymous routing in wireless mesh networks | |
| Khubalkar et al. | Security enabled DSR for establishing symmetric key and security in MANETS | |
| Patil et al. | Secure routing for MANET in adversarial environment | |
| Prasad et al. | DS-AKA-A Novel Secured Authentication Protocol for LTE-A Using Public Key Cryptography |