TY - GEN
T1 - Session key reuse scheme to improve routing efficiency in AnonDSR
AU - Kong, Chunum
AU - Chung, Min Young
AU - Choo, Hyunseung
PY - 2007
Y1 - 2007
N2 - The importance of security in ad hoc network is increasing gradually to deliver information safely among nodes in hostile environment. The data is encrypted using various encryption techniques for the security reinforcement or for hiding the communication path. AnonDSR which offers anonymity to encrypt communication path, guarantees anonymity efficiently. The anonymity of source and destination nodes is guaranteed through 3 protocols. However, secret keys and route pseudonyms must be newly created for security, whenever an anonymous communication session occurs. It generates large overhead.Therefore, the proposed scheme reduces overhead of AnonDSR to reuse symmetric keys and route pseudonyms during a certain period which is defined by user. It is possible so that the data is encrypted by symmetric key which is shared between source and destination nodes, because intermediate nodes cannot decrypt the data. This scheme maintains security features of AnonDSR to perform anonymous communication, and only performs anonymous data transfer protocol when duplicate session is occurred. Then, the route setup time is improved a minimum of 47.1% due to the decrease of route setup procedure.
AB - The importance of security in ad hoc network is increasing gradually to deliver information safely among nodes in hostile environment. The data is encrypted using various encryption techniques for the security reinforcement or for hiding the communication path. AnonDSR which offers anonymity to encrypt communication path, guarantees anonymity efficiently. The anonymity of source and destination nodes is guaranteed through 3 protocols. However, secret keys and route pseudonyms must be newly created for security, whenever an anonymous communication session occurs. It generates large overhead.Therefore, the proposed scheme reduces overhead of AnonDSR to reuse symmetric keys and route pseudonyms during a certain period which is defined by user. It is possible so that the data is encrypted by symmetric key which is shared between source and destination nodes, because intermediate nodes cannot decrypt the data. This scheme maintains security features of AnonDSR to perform anonymous communication, and only performs anonymous data transfer protocol when duplicate session is occurred. Then, the route setup time is improved a minimum of 47.1% due to the decrease of route setup procedure.
KW - Anonymous ad hoc routing
KW - Key reuse
KW - Onion
UR - https://www.scopus.com/pages/publications/38149070253
U2 - 10.1007/978-3-540-72590-9_43
DO - 10.1007/978-3-540-72590-9_43
M3 - Conference contribution
AN - SCOPUS:38149070253
SN - 9783540725893
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 303
EP - 311
BT - Computational Science - ICCS 2007 - 7th International Conference, Proceedings
PB - Springer Verlag
T2 - 7th International Conference on Computational Science, ICCS 2007
Y2 - 27 May 2007 through 30 May 2007
ER -