HOP: Achieving Efficient Anonymity in MANETs by Combining HIP, OLSR, and Pseudonyms

Offering secure and anonymous communications in mobile ad hoc networking environments is essential to achieve confidence and privacy, thus promoting widespread adoption of this kind of networks. In addition, some minimum performance levels must be achieved for any solution to be practical and become widely adopted. In this paper, we propose and implement HOP, a novel solution based on cryptographic Host Identity Protocol (HIP) that offers security and user-level anonymity in MANET environments while maintaining good performance levels. In particular, we introduce enhancements to the authentication process to achieve Host Identity Tag (HIT) relationship anonymity, along with source/destination HIT anonymity when combined with multihoming. Afterward we detail how we integrate our improved version of HIP with the OLSR routing protocol to achieve efficient support for pseudonyms. We implemented our proposal in an experimental testbed, and the results obtained show that performance levels achieved are quite good, and that the integration with OLSR is achieved with a low overhead.

[1]  Frank Stajano,et al.  Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..

[2]  Hugo Krawczyk,et al.  SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols , 2003, CRYPTO.

[3]  Hugo Krawczyk,et al.  A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..

[4]  Pin-Han Ho,et al.  ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks , 2007, 2007 IEEE International Conference on Communications.

[5]  Dong Hoon Lee,et al.  A3RP : Anonymous and Authenticated Ad Hoc Routing Protocol , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).

[6]  A. Kannammal,et al.  Privacy and Security on Anonymous Routing Protocols in MANET , 2009, 2009 Second International Conference on Computer and Electrical Engineering.

[7]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[8]  Yuguang Fang,et al.  MASK: anonymous on-demand routing in mobile ad hoc networks , 2006, IEEE Transactions on Wireless Communications.

[9]  David Chaum,et al.  The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.

[10]  Mihaela Cardei,et al.  A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .

[11]  Jianfeng Ma,et al.  An Efficient Anonymous Routing Protocol for Mobile Ad Hoc Networks , 2009, 2009 Fifth International Conference on Information Assurance and Security.

[12]  Bart Preneel,et al.  ARM: Anonymous Routing Protocol for Mobile Ad hoc Networks , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).

[13]  Juan-Carlos Cano,et al.  An overview of anonymous communications in mobile ad hoc networks , 2012, Wirel. Commun. Mob. Comput..

[14]  Xiaoyan Hong,et al.  Performance evaluation of anonymous routing protocols in MANETs , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..

[15]  Yih-Chun Hu,et al.  A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.

[16]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[17]  Vint,et al.  NS Notes and Documents , 2002 .

[18]  Juan-Carlos Cano,et al.  Anonymous routing protocols: Impact on performance in MANETs , 2009, 2009 IEEE International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems.

[19]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[20]  Tongtong Li,et al.  SPM: Source Privacy for Mobile Ad Hoc Networks , 2010, EURASIP J. Wirel. Commun. Netw..

[21]  Siu-Ming Yiu,et al.  ARMR: Anonymous routing protocol with multiple routes for communications in mobile ad hoc networks , 2009, Ad Hoc Networks.

[22]  Siguang Chen,et al.  Anonymous multipath routing protocol based on secret sharing in mobile ad hoc networks , 2011 .

[23]  Gene Tsudik,et al.  PRISM: Privacy-friendly routing in suspicious MANETs (and VANETs) , 2008, 2008 IEEE International Conference on Network Protocols.

[24]  Pekka Nikander,et al.  Host Identity Protocol , 2005 .

[25]  Xiaoyan Hong,et al.  ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks , 2003, MobiHoc '03.

[26]  Andreas Pfitzmann,et al.  Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology , 2000, Workshop on Design Issues in Anonymity and Unobservability.