TARo: Trusted Anonymous Routing for MANETs

The currently proposed anonymous routing mechanisms for Mobile Ad hoc Networks enable network entities to anonymously and securely communicate with each other. However, protocols that provide a high level of anonymity generally have poor scalability due to delays and overhead introduced by cryptographic operations, while other approaches sacrifice anonymity to achieve better performance. In this paper, we propose a novel anonymous routing protocol that provides improved anonymity and security while achieving similar or better performance, as compared to existing proposals. Our proposal achieves anonymity using a novel efficient solution for invisible implicit addressing based on keyed hash chain and security via a novel application of one-to-many Diffie-Hellman mechanism, used to exchange keys for symmetric encryption. The final contribution includes a mechanism to facilitate selection of a trusted route by verifying connections between intermediate nodes. We demonstrate the benefits of our proposal in comparison with previous approaches using analysis and simulation.

[1]  Bart Preneel,et al.  ARM: Anonymous Routing Protocol for Mobile Ad hoc Networks , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).

[2]  John A. Clark,et al.  Threat Modelling for Mobile Ad Hoc and Sensor Networks , 2009 .

[3]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.

[4]  Xiaogang Wang,et al.  A Resilient P2P Anonymous Routing Approach Employing Collaboration Scheme , 2009, J. Univers. Comput. Sci..

[5]  Roksana Boreli,et al.  Trusted routing for VANET , 2009, 2009 9th International Conference on Intelligent Transport Systems Telecommunications, (ITST).

[6]  Tuomas Aura,et al.  Cryptographically Generated Addresses (CGA) , 2005, ISC.

[7]  A. Pfitzmann,et al.  A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management , 2010 .

[8]  Mohan S. Kankanhalli,et al.  Anonymous secure routing in mobile ad-hoc networks , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[9]  Azzedine Boukerche,et al.  SDAR: a secure distributed anonymous routing protocol for wireless and mobile ad hoc networks , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[10]  R. Srikant,et al.  Towards a Theory of Anonymous Networking , 2010, 2010 Proceedings IEEE INFOCOM.

[11]  Michael De Mare Known Plaintext Attacks are in NP , 2004 .

[12]  Thomas Engel,et al.  Acimn protocol: A protocol for anonymous communication in multi hop wireless networks , 2007, 2007 Wireless Telecommunications Symposium.

[13]  Azzedine Boukerche,et al.  ARMA: An Efficient Secure Ad Hoc Routing Protocol , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[14]  Xiaoyan Hong,et al.  ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks , 2003, MobiHoc '03.

[15]  Paul F. Syverson,et al.  Proxies for anonymous routing , 1996, Proceedings 12th Annual Computer Security Applications Conference.

[16]  Ronggong Song,et al.  AnonDSR: efficient anonymous dynamic source routing for mobile ad-hoc networks , 2005, SASN '05.

[17]  Xiaoyan Hong,et al.  On Performance Cost of On-demand Anonymous Routing Protocols in Mobile Ad Hoc Networks , 2007 .

[18]  Yuguang Fang,et al.  MASK: anonymous on-demand routing in mobile ad hoc networks , 2006, IEEE Transactions on Wireless Communications.

[19]  Markus Jakobsson,et al.  Discount Anonymous On Demand Routing for Mobile Ad hoc Networks , 2006, 2006 Securecomm and Workshops.

[20]  Xiaoyan Hong,et al.  Mobility changes anonymity: mobile ad hoc networks need efficient anonymous routing , 2005, 10th IEEE Symposium on Computers and Communications (ISCC'05).

[21]  Ronggong Song,et al.  Secure dynamic distributed routing algorithm for ad hoc wireless networks , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..

[22]  Dong Hoon Lee,et al.  A3RP : Anonymous and Authenticated Ad Hoc Routing Protocol , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).

[23]  Xiaoyan Hong,et al.  Performance evaluation of anonymous routing protocols in MANETs , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..

[24]  Jun Pan,et al.  MASR: An Efficient Strong Anonymous Routing Protocol for Mobile Ad Hoc Networks , 2009, 2009 International Conference on Management and Service Science.

[25]  Markus Jakobsson,et al.  Efficient Constructions for One-Way Hash Chains , 2005, ACNS.

[26]  Andreas Pfitzmann,et al.  Networks Without User Observability: Design Options , 1985, EUROCRYPT.

[27]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[28]  Denh Sy,et al.  ODAR: On-Demand Anonymous Routing in Ad Hoc Networks , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.