B. RREP Phase
Step 1.
><→
+ DiiDSDnxRREP
hSeqIDchainrchainqKhSeqFD ,),(),(,,,,:*
Due to privacy concerns, the destination node D randomly generates a number q
and produces its pseudonym
),(
DDD
qIDHh
used in the forward path for the RREP.
The path information and other items
),,( seqqr
Ds
are encrypted by the shared
key
SD
K . The value },..,,,{)(
1 nxxxsi
rrrrrchain
++
= is the set of random number
i
r gener-
ated by all involved nodes, that is,
},,..,,,{)(
1 Dnxxxsi
IDIDIDIDIDIDchain
++
. D,
then, unicasts the RREP to its specific neighbor
nx
h
+
, that is, the next node of D in the
reverse path.
Step 2.
)
〉〈→
+−++ nxiiDSDnxRREPnx
hSeqIDchainrchainqKhSeqFN ,),(),(,,,,:*
1
)
()
〉〈→
〉〈→
++
xiiDSDsRREPx
xiiDSDxRREPx
hSeqIDchainrchainqKhSeqFN
hSeqIDchainrchainqKhSeqFN
,),(),(,,,,:*
,),(),(,,,,:*
11
The receiving node
nx
N
+
firstly compares
nx
h
+
with its identity for each pseudonym
in the route table and discards the packet if no match is found. Otherwise, if the pseu-
donym of next node in the reverse path is not filled with “null” in the matched entry,
node
nx
N
+
retrieves
nx
r
+
used in the RREQ from the route table and generates a new
pseudonym
nx
h
+
by computing ),,(
nxnxDnx
rIDhHh
+++
= in order to keep anonymity on
the forward path. The next node of
nx
N
+
in the forward path is
D
h . Afterwards, node
nx
N
+
replaces
D
h with
nx
h
+
and unicasts the RREP back to
1−+nx
h . The treatment of the
RREP among intermediate nodes is listed above.
Step 3. S receives the packet.
Assume that node S has the same pseudonym
s
h appeared in the route table and the
pseudonym of next node in the reverse path is filled with “null” in the matched entry.
The RREP travels back to the source. S retrieves the shared secret key
SD
K to obtain
the list of real identities on the path. In order to assure the validity of the forward path,
S compares the received item
x
h with the new one from the computation
of
),),,),...),,),,(((...((
11 xxxxnxnxDD
rIDrIDrIDqIDHHHH
++++
, and aborts if the verifica-
tion doesn’t hold. Otherwise,
x
h
is assigned to the pseudonym of next node in forward
path for the relevant entry of route table. Because of the end of the forward path, the
value of its pseudonym used in forward path is assigned with “null”. To this end, an
anonymous bi-direction link is built and trusted by the communicating parties.
3.2 Trust-aware Anonymous Data Transmission Protocol
After an anonymous route is establishment, the DATA transmission protocol will be
launched. Its format is as follows,
)
〉
NextHopSDDATA
IDAnonSeqDATAKSeqF .,,,, . The
purpose and process of most fields in the DATA are similar to the RREQ and the
RREP. Specifically, the treatment of
NextHop
IDAnon.
is the key to fulfill data forward-
135