
B. RREP Phase 
Step 1. 
><→
+ DiiDSDnxRREP
hSeqIDchainrchainqKhSeqFD ,),(),(,,,,:*
 
Due to privacy concerns, the destination node D randomly generates a number q 
and produces its pseudonym 
),(
DDD
qIDHh
used in the forward path for the RREP. 
The path information and other items 
),,( seqqr
Ds
are encrypted by the shared 
key
SD
K . The value  },..,,,{)(
1 nxxxsi
rrrrrchain
++
= is the set of random number
i
r gener-
ated by all involved nodes, that is, 
},,..,,,{)(
1 Dnxxxsi
IDIDIDIDIDIDchain
++
.  D, 
then, unicasts the RREP to its specific neighbor 
nx
h
+
, that is, the next node of D in the 
reverse path. 
Step 2. 
)
〉〈→
+−++ nxiiDSDnxRREPnx
hSeqIDchainrchainqKhSeqFN ,),(),(,,,,:*
1
 
)
()
〉〈→
〉〈→
++
xiiDSDsRREPx
xiiDSDxRREPx
hSeqIDchainrchainqKhSeqFN
hSeqIDchainrchainqKhSeqFN
,),(),(,,,,:*
,),(),(,,,,:*
11
 
The receiving node
nx
N
+
 firstly compares
nx
h
+
with its identity for each pseudonym 
in the route table and discards the packet if no match is found. Otherwise, if the pseu-
donym of next node in the reverse path is not filled with “null” in the matched entry, 
node 
nx
N
+
retrieves 
nx
r
+
used in the RREQ from the route table and generates a new 
pseudonym
nx
h
+
by computing  ),,(
nxnxDnx
rIDhHh
+++
=  in order to keep anonymity on 
the forward path. The next node of 
nx
N
+
in the forward path is 
D
h . Afterwards, node 
nx
N
+
replaces 
D
h with 
nx
h
+
 and unicasts the RREP back to 
1−+nx
h . The treatment of the 
RREP among intermediate nodes is listed above.  
Step 3. S receives the packet. 
Assume that node S has the same pseudonym 
s
h appeared in the route table and the 
pseudonym of next node in the reverse path is filled with “null” in the matched entry. 
The RREP travels back to the source. S retrieves the shared secret key
SD
K  to obtain 
the list of real identities on the path. In order to assure the validity of the forward path, 
S compares the received item 
x
h with the new one from the computation 
of
),),,),...),,),,(((...((
11 xxxxnxnxDD
rIDrIDrIDqIDHHHH
++++
, and aborts if the verifica-
tion doesn’t hold. Otherwise, 
x
h
is assigned to the pseudonym of next node in forward 
path for the relevant entry of route table. Because of the end of the forward path, the 
value of its pseudonym used in forward path is assigned with “null”. To this end, an 
anonymous bi-direction link is built and trusted by the communicating parties.  
3.2  Trust-aware Anonymous Data Transmission Protocol 
After an anonymous route is establishment, the DATA transmission protocol will be 
launched. Its format is as follows, 
)
〉
NextHopSDDATA
IDAnonSeqDATAKSeqF .,,,, . The 
purpose and process of most fields in the DATA are similar to the RREQ and the 
RREP. Specifically, the treatment of 
NextHop
IDAnon.
is the key to fulfill data forward-
135