Font Size: a A A

Dynamic Anonymous Routing Protocol Of The Mobile Network

Posted on:2012-03-16Degree:MasterType:Thesis
Country:ChinaCandidate:K N ZhaoFull Text:PDF
GTID:2178330335469394Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In the mobile network environment, when the mobile node excursions into a nonlocal network, it will be allowed to access only through the authentication of the network. Mobile network has many features:open communication medium, dynamic changing topology, limited channel and node resources, which makes it be attacked easily although it has the flexibility of networking. In order to prevent attacker's tracking, mobile networks need to provide anonymous service to conceal the identity of the mobile node, so anonymous service plays an important role in the mobile service. Although traditional encryption technology can be applied to provide protection of data privacy and security, integrity and identify in the mobile network, but opponents can still get the confidential information of node identity, location and so on through the header information of message and the analysis of transfer mode, and they will launch targeted attacks based on such information. Due to the security threats,the research of anonymous communications has become a hotspot in the mobile network security.The method in this paper is that each path has unique identity, and all intermediate nodes only know the identity tags of its last jump and next-hop, so it can make the position of the sender and the receiver anonymous. Even if all the intermediate nodes collusion up, they don't know who are the sender and the receiver. In data transmission phase, it can make the encrypted information confidential by the session key, and in front of encrypted data,we added a section of code which length is PLi, it can increase the difficulty of hacking session key. In the mobile network, due to the computing capacity of the equipment is weak, so in this paper we choose symmetrical encryption to encrypt data when it transfers data.It shows the unique path through the path identity tags in order to effectively solve the problem of the anonymous for both user in communication, and it uses the technology of symmetrical encryption to guarantee the security of communication and also take care of the computing power of mobile devices.The simulation experiment shows that we realized the anonymous of sender and receiver in this paper. This algorithm dynamic hidden source address and destination node address, it can adapt the dynamic changes of topological structure; has higher anonymous degrees, can provide anonymous service in the open link; has short link length, small bandwidth costs, no need to distribute the key. In data transfers stage, it has fewer decrypted, especially suitable for limited bandwidth and computing resources of the mobile Internet; and its delay time is short which can be used for connectionless networks service and also can improve the real-time of anonymous communications. Therefore, the algorithm in this paper is very suitable for the structure of mobile Interne and the needs of anonymous service.
Keywords/Search Tags:mobile networks, Session key, Identity, dynamic anonymous
PDF Full Text Request
Related items