• DocumentCode
    2124646
  • Title

    Acimn protocol: A protocol for anonymous communication in multi hop wireless networks

  • Author

    Fusenig, Volker ; Spiewak, Dagmara ; Engel, Thomas

  • Author_Institution
    Fac. des Sci., Luxembourg Univ., Coudenhove-Kalergi
  • fYear
    2007
  • fDate
    26-28 April 2007
  • Firstpage
    1
  • Lastpage
    1
  • Abstract
    Summary form only given. Anonymity is the state of not being identifiable within a set of subjects. Different strategies exist for assuring anonymity in computer networks, such as the dining cryptographers network and mix networks. But these strategies were designed for wired networks requiring direct communication links or fixed infrastructure. Therefore they are not applicable to multi hop wireless networks without modification. The Acimn protocol bases on the combination of these two main strategies enabling nodes to communicate anonymously among each other. Every node of the network acts as a mix so that the Mix approach can be used to hide the multi hop communication. By using this technique only one message overhead per communication path is generated because of the key establishment among the nodes on the path. During following communications only little computational power is needed by every node on the path to decrypt the messages before forwarding them to the next node. Additionally every one hop communication is kept anonymously by using the DC-net protocol. Therefor the nodes are arranged in groups of at most three members that are in communication range of each other. Sending of messages takes place in rounds where in every round only one group member is able to transmit information but every member has to send data. Because of the maximal group size of three there can be maximally three times more messages compared to the sending without the DC-net approach. By utilizing the combination of both techniques neither non participating eavesdropper nor nodes on the communication path are able to track the communication partners while the overhead is kept small.
  • Keywords
    multi-access systems; protocols; security of data; wireless sensor networks; Acimn protocol; anonymous communication; computer networks; multi hop wireless networks; Computer networks; Cryptographic protocols; Cryptography; Wireless application protocol; Wireless networks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Wireless Telecommunications Symposium, 2007. WTS 2007
  • Conference_Location
    Pomona, CA
  • ISSN
    1934-5070
  • Print_ISBN
    978-1-4244-0696-8
  • Electronic_ISBN
    1934-5070
  • Type

    conf

  • DOI
    10.1109/WTS.2007.4563320
  • Filename
    4563320