Secure and Anonymous Distributed Location Service for Mobile Ad Hoc Networks
管理學院 - 資訊管理系
Department of Information Management
|Thesis Publication Year:||2011|
|Graduation Academic Year:||99|
|Keywords (in Chinese):||無線行動隨意網路 、位置服務 、匿名性 、安全性|
|Keywords (in other languages):||Mobile ad hoc network, Location service, Anonymity, Security|
|Reference times:||Clicks: 86 Downloads: 0|
|School Collection Retrieve National Library Collection Retrieve Error Report|
In large and dense mobile ad hoc network, location-based routing protocols which use location information of destination to make route decision can offer signif-icant route performance. It can promote route performance by using location infor-mation. However, it is also a high private data for person. Due to the characteristic of signal open in wireless network, it is very easy to eavesdrop the message contexts. To protect private data, encryption operation is a common method. Data encryption causes control packet size increase and operation latency, it impacts the network per-formance. Furthermore, location-based routing protocols must have a complete loca-tion service; it can offer the basic functions of location management, such as location update and location query. To maintain both anonymity of mobile node and protection of its location privacy at all stages, we propose a secure and anonymous distributed location service named SADLS. We reduce to use data encryption as much as possible. Thus, we hide the private data such as the real identity of mobile node and its location information through using pseudonym as identifier of node. Both analysis and simula-tion results show that SADLS can offer better security, anonymity and performance than DISPOSER. The average end-to-end delay for location query reduces 58%. However, it reduces 90% in location update.
 M. Mauve, J. Widmer and H. Hartenstein, A Survey on Position Based Routing in Mobile Ad-hoc Networks, IEEE Network Magazine, 15(6): pp. 30–39, No-vember 2001.
 B. Karp, H.T. Kung, GPSR: greedy perimeter stateless routing for wireless net-works, in Mobile Computing and Networking, pp. 243–254, 2000.
 L. Blazevic, L. Buttyan, S. Giordano, J.-P. Hubaux, and J.-Y. Le Boudec, Self-Organization in Mobile Ad hoc networks: The Approach of Terminodes, IEEE Personal Communications, pp. 166–174, June, 2000.
 S. Basagni and et. al. A Distance Routing Effect Algorithm for Mobility (DREAM). In ACM/IEEE MobiCom '98, October, 1998
 H. Cheng, J. Cao, H.-H. Chen and H. Zhang. “GrLS: Group-based location ser-vice in mobile ad hoc networks,” IEEE Transactions on Vehicular Technology, 57(6): pp. 3693-3707, November, 2008.
 Y. Xue, B. Li, and K. Nahrstedt, “A scalable location management scheme in mobile ad-hoc networks,” Proc. 26th Ann. IEEE Conf. Local Computer Networks, 2001.
 W. Kiess, H. Fssler, J. Widmer, M. Mauve, “Hierarchical Location Service for Mobile Ad-Hoc Networks”, ACM MC2R, vol. 8, no. 4, Oct. 2004.
 I. Stojmenovic, “A routing strategy and quorum based location update scheme for ad hoc wireless networks,” SITE, Univ. Ottawa, Ottawa, ON, Canada, Tech. Rep. TR-99-09, 1999.
 X. Wu, “VDPS: Virtual home region based distributed position service in mobile ad hoc networks,” in Proc. ICDCS, pp. 113–122, June, 2005.
 P. Hsiao, “Geographical region summary service for geographical routing,” ACM MC2R, vol. 5, no. 4, pp. 25–39, January, 2002.
 X. Wu, “DISPOSER: distributed secure position service in mobile ad hoc net-works: Research Articles,” Wirel. Commun. Mob. Comput., vol. 6, no. 3, pp. 357–373, 2006.
 Z. Zhi and Y. K. Choong. Anonymizing Geographic Ad Hoc Routing for Pre-serving Location Privacy. In IEEE ICDCSW’05, pp. 646–651, 2005.
 J. Zhou, Z. Lu. A Secure Distributed Location Service Scheme for Mobile Ad Hoc Networks. In IEEE CNMT, pp. 1-4, 2009.
 Isakow, A. and Shi, H. “Design and Development of ‘GlobeTrotter’ –An Innova-tive Location Based System using J2ME”, International Journal of Computer Science and Network Security, Vol 8 No. 3, pp. 201-207, March, 2008.
 Sheng-Cheng Yeh, Wu-Hsiao Hsu, Ming-Yang Su, Ching-Hui Chen, and Ko-Hung Liu, “A Study on Outdoor Positioning Technology Using GPS and WiFi Networks”, In IEEE ICNSC, pp.597-601, March, 2009.
 A. Beresford and F. Stajano. Mix zones: User privacy in location-aware services. In IEEE PerSec, 2004.
 J. Liao and J. Li. Effectively Changing Pseudonyms for Privacy Protection in VANETs. In IEEE ISPAN, pp. 648-652, 2009.
 J. Freudiger*, M. H. Manshaei*, J.-Y. Le Boudec, and J.-P. Hubaux. On the Age of Pseudonyms in Mobile Ad Hoc Networks. In IEEE Infocom, 2010.
 P. J. Chuang, J. S. Deng and C. S. Lin. Location Privacy Protection Using Inde-pendent ID Update for WLANs. In Journal of Information Science and Engi-neering 27, pp. 403-418, March, 2011.
 M. Li, K. Sampigethaya, L. Huang, and R. Poovendran, “Swing & Swap: Us-er-Centric Approaches Towards Maximizing Location Privacy,” ACM WPES, pp. 19-28, October, 2006.
 J. F. Raymond. Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems. In H. Federrath, editor, Designing Privacy Enhancing Technologies: Workshop on Design Issue in Anonymity and Unobservability, pages 10–29. Springer-Verlag, LNCS 2009, July 2000.
 V. Gupta, S. Gupta, S. Chang, and D. Stebila. Performance Analysis of Elliptic Curve Cryptography for (SSL). In Proc. ACM Workshop on Wireless Security, September, 2002.
 Xiaoxin Wu and Bharat Bhargava,“AO2P: Ad Hoc On-Demand Position-Based Private Routing Protocol.” IEEE Transactions on Mobile Computing, vol. 4, no. 4, pp. 335-348, July, 2005.
 Qualnet, Scalable Network Technologies (SNT), http://www.qualnet.com/, 2011.
 D. Johnson and D. Maltz, “Dynamic Source Routing in Ad Hoc Wireless Net-works,” in Mobile Computing (Kluwer Academic) chapter 5, pp. 153-181, 1996.