Mobile Ad Hoc network is a mufti-hop wireless network that consists of a series of mobile terminal nodes. Compared to wired networks, Ad Hoc network is particularly vulnerable due to its fundamental characteristics, such as no center, dynamic topology, self-organizing and multi-hop routing. Concerning the security issues which are common in Wireless Ad Hoc Networks, security researchers have proposed a variety of technologies in wireless Ad Hoc networks for anonymous communication that is based on the wired network with the aim of preventing malicious eavesdropping, traffic analysis and other passive attacks. While the anonymous communication system in Wireless Ad Hoc network is providing protection of privacy information to nodes, it is also creating opportunities for criminals to conduct illegal activities using anonymous technology. Therefore, providing anonymous services in the same time there should be controllable anonymity. This paper contributes to the discussion and research on anonymous communication and controllable anonymous technology in mobile Ad Hoc networks.The main work done by this paper is as follows:1. The paper proposes a certificateless public key cryptosystem that is used in Ad Hoc network, i.e. the mechanism of pseudo-identity mentioned in the paper. The system is a variation of the public key system based on the identity. It has solved the problem of the traditional certificate existence problem in public key cryptography system that is based on PKI technology; meanwhile it has also solved the identity-based cryptography key escrow problem.2. It puts forward a new application for mobile Ad Hoc network identity traceable anonymous communication scheme. The scheme uses the threshold secret sharing to achieve complete distributed management. The Nodes achieve Anonymous authentication and communication through the pseudo-identity. If necessary, the system administrator can track the true identity of malicious nodes.3. It suggests a ring signcryption scheme that can track the signer in the mobile Ad Hoc network. The program achieves anonymous signcryption communication through using ring signatures and attaching some additional information in ring signatures. If necessary, through the coordination of all nodes, the procedure can track the true identity of the malicious nodes. |