Performance and Security Analyses of Onion-Based Anonymous Routing for Delay Tolerant Networks

Delay tolerant network (DTN) routing provides a communication primitive in intermittently disconnected networks, such as battlefield communications and human-contact networks. In these applications, the anonymity preserving mechanism, which hides the identities of communicating parties, plays an important role as a defense against cyber and physical attacks. While anonymous routing protocols for DTNs have been proposed in the past, to the best of our knowledge, there is no work that emphasizes analysis of the performance of these protocols. In this paper, we first design an abstract of anonymous routing protocols for DTNs and augment the existing solution with multi-copy message forwarding. Then, we construct simplified mathematical models, which can be used to understand the fundamental performance and security guarantees of onion-based anonymous routing in DTNs. To be specific, the delivery rate, message forwarding cost, traceable rate, and path and node anonymity are defined and analyzed. The numerical and simulation results using randomly generated contact graphs and the real traces demonstrate that our models provide very close approximations to the performance of the anonymous DTN routing protocol.

[1]  Guohong Cao,et al.  Supporting Cooperative Caching in Disruption Tolerant Networks , 2011, 2011 31st International Conference on Distributed Computing Systems.

[2]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[3]  Donald F. Towsley,et al.  Study of a bus-based disruption-tolerant network: mobility modeling and impact on routing , 2007, MobiCom '07.

[4]  Ali Shoker,et al.  RAC: A Freerider-Resilient, Scalable, Anonymous Communication Protocol , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems.

[5]  Amin Vahdat,et al.  Epidemic Routing for Partially-Connected Ad Hoc Networks , 2009 .

[6]  Elisa Bertino,et al.  An Analysis Study on Zone-Based Anonymous Communication in Mobile Ad Hoc Networks , 2007, IEEE Transactions on Dependable and Secure Computing.

[7]  Aniket Kate,et al.  (Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection , 2014, IACR Cryptol. ePrint Arch..

[8]  Jie Wu,et al.  An optimal probabilistic forwarding protocolin delay tolerant networks , 2009, MobiHoc '09.

[9]  Paul F. Syverson,et al.  Onion routing , 1999, CACM.

[10]  Ronggong Song,et al.  AnonDSR: efficient anonymous dynamic source routing for mobile ad-hoc networks , 2005, SASN '05.

[11]  Zhengyi Le,et al.  EnPassant: anonymous routing for disruption-tolerant networks with applications in assistive environments , 2011, Secur. Commun. Networks.

[12]  Pan Hui,et al.  CRAWDAD dataset cambridge/haggle (v.2009-05-29) , 2009 .

[13]  Aniket Kate,et al.  Anonymity and security in delay tolerant networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[14]  Jie Wu,et al.  Survey on anonymous communications in computer networks , 2010, Comput. Commun..

[15]  Donald F. Towsley,et al.  Anti-localization anonymous routing for Delay Tolerant Network , 2010, Comput. Networks.

[16]  Riccardo Bettati,et al.  A quantitative analysis of anonymous communications , 2004, IEEE Transactions on Reliability.

[17]  Rabin K. Patra,et al.  Routing in a delay tolerant network , 2004, SIGCOMM '04.

[18]  Xiaoyan Hong,et al.  ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks , 2003, MobiHoc '03.

[19]  Jie Wu,et al.  An Analysis of Onion-Based Anonymous Routing for Delay Tolerant Networks , 2016, 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS).

[20]  Wenjing Lou,et al.  Anonymous communications in mobile ad hoc networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[21]  Robert Beverly,et al.  Toward anonymity in Delay Tolerant Networks: Threshold Pivot Scheme , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.

[22]  E. Praganavi,et al.  EFFICIENT AND PRIVACY-AWARE DATA AGGREGATION IN MOBILE SENSING , 2017 .

[23]  Vikram Srinivasan,et al.  PeopleNet: engineering a wireless virtual social network , 2005, MobiCom '05.

[24]  Markus Jakobsson,et al.  Discount Anonymous On Demand Routing for Mobile Ad hoc Networks , 2006, 2006 Securecomm and Workshops.

[25]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[26]  Cauligi S. Raghavendra,et al.  Spray and wait: an efficient routing scheme for intermittently connected mobile networks , 2005, WDTN '05.

[27]  Ellen W. Zegura,et al.  ARDEN: Anonymous networking in delay tolerant networks , 2012, Ad Hoc Networks.

[28]  Xiuzhen Cheng,et al.  Routing in pocket switched networks , 2012, IEEE Wireless Communications.

[29]  Arun Venkataramani,et al.  DTN routing as a resource allocation problem , 2007, SIGCOMM '07.

[30]  Denh Sy,et al.  ODAR: On-Demand Anonymous Routing in Ad Hoc Networks , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[31]  Stefano Basagni,et al.  Secure pebblenets , 2001, MobiHoc '01.

[32]  Qinghua Li,et al.  Forwarding redundancy in opportunistic mobile networks: Investigation and elimination , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[33]  Mohan S. Kankanhalli,et al.  Anonymous secure routing in mobile ad-hoc networks , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[34]  Bart Preneel,et al.  Towards Measuring Anonymity , 2002, Privacy Enhancing Technologies.