LSR: A location secure routing protocol for ad hoc networks

For safety and privacy protection, nodes participating in ad hoc networks must keep their precise location in secret. When having to report its location (for routing purposes, etc.), a node can report only a cloaking region, a spatial region that contains its current position. Reducing location resolution has a significant impact on the applications that rely on nodes' location information. These applications can become less efficient. Some may not even function. Moreover, operations such as packet forwarding may allow an adversary to refine a node's location resolution, thus reversing the effect of location cloaking in safety and privacy protection. In this paper, we investigate these problems in the context of geographic ad hoc routing and propose a novel concept called safe link. A network link is considered safe if sending and receiving of a data packet do not allow an adversary to refine the sender and receiver's location. With this concept in place, we develop a new secure routing protocol that can work with inaccurate location and construct a routing path using only safe links. We evaluate the performance of the proposed technique under various network conditions using simulation. Detailed results are presented to provide the insight of the impact of safety and privacy protection on packet delivery.

[1]  Chi-Yin Chow,et al.  A peer-to-peer spatial cloaking algorithm for anonymous location-based service , 2006, GIS '06.

[2]  Panos Kalnis,et al.  MobiHide: A Mobilea Peer-to-Peer System for Anonymous Location-Based Queries , 2007, SSTD.

[3]  Nitin H. Vaidya,et al.  Location-aided routing (LAR) in mobile ad hoc networks , 1998, MobiCom '98.

[4]  Elisa Bertino,et al.  Privacy-Aware Location-Aided Routing in Mobile Ad Hoc Networks , 2010, 2010 Eleventh International Conference on Mobile Data Management.

[5]  Young-Jin Kim,et al.  Geographic routing made practical , 2005, NSDI.

[6]  Tarek F. Abdelzaher,et al.  Range-free localization schemes for large scale sensor networks , 2003, MobiCom '03.

[7]  Yan Zhang,et al.  Geometric ad-hoc routing: of theory and practice , 2003, PODC '03.

[8]  Leonard Kleinrock,et al.  Optimal Transmission Ranges for Randomly Distributed Packet Radio Terminals , 1984, IEEE Trans. Commun..

[9]  David A. Wagner,et al.  Secure verification of location claims , 2003, WiSe '03.

[10]  Zhi Zhou,et al.  Anonymizing geographic ad hoc routing for preserving location privacy , 2005, 25th IEEE International Conference on Distributed Computing Systems Workshops.

[11]  Leonard Kleinrock,et al.  The Spatial Capacity of a Slotted ALOHA Multihop Packet Radio Network with Capture , 1984, IEEE Trans. Commun..

[12]  Ben Leong,et al.  Path vector face routing: geographic routing with local face information , 2005, 13TH IEEE International Conference on Network Protocols (ICNP'05).

[13]  Yong Guan,et al.  Location Verification Algorithms forWireless Sensor Networks , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).

[14]  Ivan Stojmenovic,et al.  Routing with Guaranteed Delivery in Ad Hoc Wireless Networks , 1999, DIALM '99.

[15]  Ying Cai,et al.  Location Cloaking for Safety Protection of Ad Hoc Networks , 2009, IEEE INFOCOM 2009.

[16]  Tian He,et al.  Range-free localization schemes in large scale sensor network , 2003, MobiCom 2003.

[17]  Jorge Urrutia,et al.  Compass routing on geometric networks , 1999, CCCG.

[18]  Bharat K. Bhargava,et al.  AO2P: ad hoc on-demand position-based private routing protocol , 2005, IEEE Transactions on Mobile Computing.

[19]  Panos Kalnis,et al.  PRIVE: anonymous location-based queries in distributed mobile systems , 2007, WWW '07.

[20]  Theodore S. Rappaport,et al.  Wireless communications - principles and practice , 1996 .

[21]  Nitin H. Vaidya,et al.  A dynamic mix method for wireless ad hoc networks , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).

[22]  Jianliang Xu,et al.  Non-Exposure Location Anonymity , 2009, 2009 IEEE 25th International Conference on Data Engineering.

[23]  Xiaoyan Hong,et al.  ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks , 2003, MobiHoc '03.

[24]  Ying Cai,et al.  Location safety protection in ad hoc networks , 2009, Ad Hoc Networks.

[25]  Brad Karp,et al.  GPSR: greedy perimeter stateless routing for wireless networks , 2000, MobiCom '00.

[26]  Charles E. Perkins,et al.  Multicast operation of the ad-hoc on-demand distance vector routing protocol , 1999, MobiCom.

[27]  Chi-Yin Chow,et al.  Enabling Private Continuous Queries for Revealed User Locations , 2007, SSTD.

[28]  Fabian Kuhn,et al.  Worst-Case optimal and average-case efficient geometric ad-hoc routing , 2003, MobiHoc '03.

[29]  Gregory G. Finn,et al.  Routing and Addressing Problems in Large Metropolitan-Scale Internetworks. ISI Research Report. , 1987 .

[30]  Yuguang Fang,et al.  MASK: anonymous on-demand routing in mobile ad hoc networks , 2006, IEEE Transactions on Wireless Communications.

[31]  Ting-Chao Hou,et al.  Transmission Range Control in Multihop Packet Radio Networks , 1986, IEEE Trans. Commun..