Learn More
Due to the broadcast nature of radio transmissions, communications in mobile ad hoc networks (MANETs) are more susceptible to malicious traffic analysis. In this paper we propose a novel anonymous on-demand routing protocol, termed MASK, to enable anonymous communications thereby thwarting possible traffic analysis attacks. Based on a new cryptographic(More)
Security is a critical issue in a mobile ad hoc network (MANET). In this paper, we propose and investigate a novel scheme, Security Protocol for REliable dAta Delivery (SPREAD), to enhance the data confidentiality service in a mobile ad hoc network. The proposed SPREAD scheme aims to provide further protection to secret messages from being compromised (or(More)
Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose a suite of location-based compromise-tolerant security mechanisms. Based on a new cryptographic concept called pairing, we propose the notion of location-based keys (LBKs) by binding private(More)
The shared wireless medium of mobile ad hoc networks facilitates passive, adversarial eavesdropping on data communications whereby adversaries can launch various devastating attacks on the target network. To thwart passive eavesdropping and the resulting attacks, we propose a novel anonymous ondemand routing protocol, termed MASK, which can accomplish both(More)
This paper studies key management, a fundamental problem in securing mobile ad hoc networks (MANETs). We present IKM, an ID-based key management scheme as a novel combination of ID-based and threshold cryptography. IKM is a certificateless solution in that public keys of mobile nodes are directly derivable from their known IDs plus some common information.(More)
The recent Federal Communications Commission regulations for ultra-wideband (UWB) transmission systems have sparked a surge of research interests in the UWB technology. One of the important application areas of UWB is wireless sensor networks. The proper operations of many UWB sensor networks rely on the knowledge of physical sensor locations. However, most(More)
The proper functioning of mobile ad hoc networks depends on the hypothesis that each individual node is ready to forward packets for others. This common assumption, however, might be undermined by the existence of selfish users who are reluctant to act as packet relays in order to save their own resources. Such non-cooperative behavior would cause the sharp(More)
This paper addresses energy conservation, a fundamental issue of paramount importance in heterogeneous mobile ad hoc networks (MANETs) consisting of powerful nodes (i.e., P-nodes) as well as normal nodes (i.e., B-nodes). By utilizing the inherent device heterogeneity, we propose a cross-layer designed Device-Energy-Load Aware Relaying framework, named(More)
This paper studies public-key management, a fundamental problem in providing security support for mobile ad hoc networks. The infrastructureless nature and network dynamics of ad hoc networks make the conventional certificatebased public-key solutions less suitable. To tackle this problem, we propose a novel Anonymous and Certificateless Public-Key(More)
Wireless sensor networks are often deployed in unattended and hostile environments, leaving individual sensors vulnerable to security compromise. The paper proposes the novel notion of location-based keys for designing compromise-tolerant security mechanisms for sensor networks. Based on location-based keys, we develop a node-to-node authentication scheme,(More)