Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1176617.1176756acmconferencesArticle/Chapter ViewAbstractPublication PagessplashConference Proceedingsconference-collections
Article

HOP: achieving efficient anonymity in MANETs by combining HIP, OLSR, and pseudonyms

Published: 01 January 2011 Publication History

Abstract

Offering secure and anonymous communications in mobile ad hoc networking environments is essential to achieve confidence and privacy, thus promoting widespread adoption of this kind of networks. In addition, some minimum performance levels must be achieved for any solution to be practical and become widely adopted. In this paper, we propose and implement HOP, a novel solution based on cryptographic Host Identity Protocol (HIP) that offers security and user-level anonymity in MANET environments while maintaining good performance levels. In particular, we introduce enhancements to the authentication process to achieve Host Identity Tag (HIT) relationship anonymity, along with source/destination HIT anonymity when combined with multihoming. Afterward we detail how we integrate our improved version of HIP with the OLSR routing protocol to achieve efficient support for pseudonyms. We implemented our proposal in an experimental testbed, and the results obtained show that performance levels achieved are quite good, and that the integration with OLSR is achieved with a low overhead.

References

[1]
B. Wu, J. Chen, J. Wu, and M. Cardei, "A survey on attacks and countermeasures in mobile ad hoc networks," in Wireless/Mobile Network Security, Springer, New York, NY, USA, 2006.
[2]
Y.-C. Hu and A. Perrig, "A survey of secure wireless ad hoc routing," IEEE Security and Privacy, vol. 2, no. 3, pp. 28-39, 2004.
[3]
D. Chaum, "The dining cryptographers problem: unconditional sender and recipient untraceability," Journal of Cryptology, vol. 1, no. 1, pp. 65-75, 1988.
[4]
D. L. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Communications of the ACM, vol. 24, no. 2, pp. 84-88, 1981.
[5]
R. Dingledine, N. Mathewson, and P. Syverson, "Tor: the second-generation onion router," in Proceedings of the 13th USENIX Security Symposium, August 2004.
[6]
J. Kong and X. Hong, "ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks," in Proceedings of the 4th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC '03), pp. 291-302, New York, NY, USA, June 2003.
[7]
Y. Zhang, W. Liu, W. Lou, and Y. Fang, "MASK: anonymous on-demand routing in mobile ad hoc networks," IEEE Transactions on Wireless Communications, vol. 5, no. 9, pp. 2376- 2385, 2006.
[8]
X. Lin, R. Lu, H. Zhu, P. -H. Ho, X. Shen, and Z. Cao, "ASRPAKE: an anonymous secure routing protocol with authenticated key exchange for wireless ad hoc networks," in Proceedings of the IEEE International Conference on Communications (ICC '07), pp. 1247-1253, 2007.
[9]
J. H. Paik, B. H. Kim, and D. H. Lee, "A3RP: anonymous and authenticated ad hoc routing protocol," in Proceedings of the 2nd IEEE International Conference on Information Security and Assurance (ISA '08), pp. 67-72, April 2008.
[10]
M. Nácher, C. T. Calafate, J. C. Cano, and P. Manzoni, "An overview of anonymous communications in mobile ad hoc networks," Wireless Communications and Mobile Computing. In press.
[11]
K. El Defrawy and G. Tsudik, "Prism: privacy-friendly routing in suspicious manets (and vanets)," in Proceedings of the IEEE International Conference on Network Protocols, Orlando, Fla, USA, October 2008.
[12]
E. H. J. Kumari and A. Kannammal, "Privacy and security on anonymous routing protocols in manet," in Proceedings of the 2nd International Conference on Computer and Electrical Engineering, Dubai, UAE, December 2009.
[13]
S. Seys and B. Preneel, "ARM: anonymous routing protocol for mobile ad hoc networks," International Journal of Wireless and Mobile Computing, vol. 3, no. 3, pp. 145-155, 2009.
[14]
X. Li, H. Li, J. Ma, and W. Zhang, "An efficient anonymous routing protocol formobile ad hoc networks," in Proceedings of the 5th International Conference on Information Assurance and Security (IAS '09), vol. 2, pp. 287-290, Xi'an, China, August 2009.
[15]
J. Ren, Y. Li, and T. Li, "Spm: source privacy for mobile ad hoc networks," EURASIP Journal on Wireless Communications and Networking, vol. 2010, Article ID 534712, 10 pages, 2010.
[16]
Y. Dong, T. W. Chim, V. O. K. Li, S. M. Yiu, and C. K. Hui, "ARMR: anonymous routing protocol with multiple routes for communications in mobile ad hoc networks," Ad Hoc Networks, vol. 7, no. 8, pp. 1536-1550, 2009.
[17]
S. Chen and M. Wu, "Anonymous multipath routing protocol based on secret sharing in mobile ad hoc networks," in Proceedings of the International Conference on Measuring Technology and Mechatronics Automation (ICMTMA '10), vol. 1, pp. 582-585, Changsha, China, March 2010.
[18]
A. Pfitzmann and M. Hansen, "Anonymity, unobservability, and pseudonymity--a proposal for terminology," in Proceedings of the Workshop on Design Issues in Anonymity and Unobservability, pp. 1-9, 2000.
[19]
R. Moskowitz, P. Nikander, P. Jokela, and T. Henderson, "Host Identity Protocol," RFC 5201, April 2008.
[20]
T. Clausen and P. Jacquet, "Optimized link state routing protocol (OLSR). Request for Comments 3626, MANET Working Group," Work in progress, October 2003, http://www.ietf .org/rfc/rfc3626.txt.
[21]
S. Kent and K. Seo, "Security Architecture for the Internet Protocol," IETF RFC 4301, December 2005.
[22]
J. Liu, J. Kongt, X. Hong, and M. Gerla, "Performance evaluation of anonymous routing protocols in MANETs," in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC '06), pp. 646-651, New Orleans, La, USA, April 2006.
[23]
M. Nácher, C. T. Calafate, J. C. Cano, and P. Manzoni, "Anonymous routing protocols: impact on performancein MANETs," in Proceedings of the IEEE International Symposium on Modelling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS '09), London, UK, September 2009.
[24]
Internet Engineering Task Force, "Host identity protocol working group charter," http://www.ietf.org/html.charters/ hip-charter.html.
[25]
H. Krawczyk, "SIGMA: the 'SIGn-and-MAc' approach to authenticated Diffie-Hellman and its use in theIKE protocols," in Proceedings of the International Conference on Cryptology (CRYPTO '03), Springer LNCS Advances in Cryptography, pp. 400-425, Santa Barbara, Calif, USA, August 2003.
[26]
IEEE 802.15.1(tm) IEEE Standard for Information technology-- Telecommunications and information exchange between systems--Local and metropolitan area networks-- Specific requirements Part 15.1: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Wireless Personal Area Networks (WPANs(tm)), 2002.
[27]
A. R. Beresford and F. Stajano, "Location privacy in pervasive computing," IEEE Pervasive Computing, vol. 2, no. 1, pp. 46- 55, 2003.
[28]
OpenHIP, http://downloads.sourceforge.net/openhip/hip-0.5 .tgz.
[29]
Ralink Technology Corporation, January 2009, http://www .ralinktech.com/.
[30]
A. Tonnesen et al., "Olsrd: an ad hoc wireless mesh routing daemon," http://www.olsr.org.
[31]
The netfilter.org iptables project, January 2009, http://www .netfilter.org/.
[32]
K. Fall and K. Varadhan, "ns notes and documents," The VINT Project. UC Berkeley, LBL, USC/ISI, and Xerox PARC, February 2000.

Cited By

View all
  • (2024)Choral: Object-oriented Choreographic ProgrammingACM Transactions on Programming Languages and Systems10.1145/363239846:1(1-59)Online publication date: 16-Jan-2024
  • (2023)HasChor: Functional Choreographic Programming for All (Functional Pearl)Proceedings of the ACM on Programming Languages10.1145/36078497:ICFP(541-565)Online publication date: 31-Aug-2023
  • (2022)Towards a Message Broker Free FaaS for Distributed Dataflow Applications2022 9th International Conference on Future Internet of Things and Cloud (FiCloud)10.1109/FiCloud57274.2022.00009(9-15)Online publication date: Aug-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
OOPSLA '06: Companion to the 21st ACM SIGPLAN symposium on Object-oriented programming systems, languages, and applications
October 2006
530 pages
ISBN:159593491X
DOI:10.1145/1176617
  • General Chair:
  • Peri Tarr,
  • Program Chair:
  • William R. Cook
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 January 2011
Accepted: 01 September 2010
Revised: 31 July 2010
Received: 19 May 2010

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

OOPSLA06
Sponsor:

Upcoming Conference

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)1
Reflects downloads up to 20 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Choral: Object-oriented Choreographic ProgrammingACM Transactions on Programming Languages and Systems10.1145/363239846:1(1-59)Online publication date: 16-Jan-2024
  • (2023)HasChor: Functional Choreographic Programming for All (Functional Pearl)Proceedings of the ACM on Programming Languages10.1145/36078497:ICFP(541-565)Online publication date: 31-Aug-2023
  • (2022)Towards a Message Broker Free FaaS for Distributed Dataflow Applications2022 9th International Conference on Future Internet of Things and Cloud (FiCloud)10.1109/FiCloud57274.2022.00009(9-15)Online publication date: Aug-2022
  • (2021)Dyninka: a FaaS framework for distributed dataflow applicationsProceedings of the 8th ACM SIGPLAN International Workshop on Reactive and Event-Based Languages and Systems10.1145/3486605.3486789(2-13)Online publication date: 18-Oct-2021
  • (2021)A Typed Slicing Compilation of the Polymorphic RPC calculusProceedings of the 23rd International Symposium on Principles and Practice of Declarative Programming10.1145/3479394.3479406(1-15)Online publication date: 6-Sep-2021
  • (2020)A polymorphic RPC calculusScience of Computer Programming10.1016/j.scico.2020.102499197(102499)Online publication date: Oct-2020
  • (2020)CorteX: A Software Framework for Interoperable, Plug-and-Play, Distributed, Robotic Systems of SystemsSoftware Engineering for Robotics10.1007/978-3-030-66494-7_10(295-344)Online publication date: 17-Dec-2020
  • (2019)Developing Distributed Systems with Multitier ProgrammingProceedings of the 13th ACM International Conference on Distributed and Event-based Systems10.1145/3328905.3332465(203-204)Online publication date: 24-Jun-2019
  • (2019)A theory of RPC calculi for client–server modelJournal of Functional Programming10.1017/S095679681900002929Online publication date: 22-Mar-2019
  • (2018)Distributed system development with ScalaLociProceedings of the ACM on Programming Languages10.1145/32764992:OOPSLA(1-30)Online publication date: 24-Oct-2018
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media