Skip to main content

A Study on Anonymous Communication Technology in MANET

  • Conference paper
  • First Online:
High Performance Computing and Applications (HPCA 2015)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9576))

  • 734 Accesses

Abstract

This paper addresses the anonymous communications technology. Multiple hops, self-organization, no fixed facilities and limited computing resources of wireless ad hoc networks (MANET) make it hard to apply high complexity of a traditional network security algorithm. Security mechanisms can better solve the security issues of anonymous communication. This paper mainly studies the existing anonymous technology of traditional networks and MANET, and summarizes its advantages and disadvantages. With this article, readers can have a more thorough understanding of anonymous communication security and research trends in this area.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yuan, J., Lu, J.F.: The research and application of terminal using in vehicle network. In: Proceeding IEEE ICEIEC, Beijing, China, pp. 305–308 (2013)

    Google Scholar 

  2. Sood, M., Kanwar, S.: Clustering in MANET and VANET: a survey. In: Proceeding CSCITA, Mumbai, Maharashtra, India, pp. 375–380 (2014)

    Google Scholar 

  3. Chen, X., Makki, K., Yen, K., Pissinou, N.: Sensor network security: a survey. IEEE Commun. Surv. Tut. 11, 52–73 (2009)

    Article  Google Scholar 

  4. Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24, 84–90 (1981)

    Article  Google Scholar 

  5. Golle, P., Jakobsson, M., Juels, A., Syverson, P.F.: Universal re-encryption for mixnets. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 163–178. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  6. Gomułkiewicz, M., Klonowski, M., Kutyłowski, M.: Onions based on universal re-encryption – anonymous communication immune against repetitive attack. In: Lim, C.H., Yung, M. (eds.) WISA 2004. LNCS, vol. 3325, pp. 400–410. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  7. Goldschlag, D., Reed, M., Syverson, P.: Onion routing. Commun. ACM 42, 39–41 (1999)

    Article  Google Scholar 

  8. Zhao, F.X., Wang, Y.M., Wang, C.J.: An authenticated scheme of onion routing. Chin. J. Comput. 24, 463–467 (2001)

    Google Scholar 

  9. Li, L.H., Fu, S.F., Su, R.D., Che, X.Q.: Cryptanalysis of a hybrid-structured onion routing scheme. J. Commun. 34, 88–98 (2013)

    Google Scholar 

  10. Reiter, M.K., Rubin, A.D.: Crowds: anonymity for web transactions. ACM Trans. Inf. Syst. Secur. 1, 66–92 (1998)

    Article  Google Scholar 

  11. Tao, T., Bao, R.D., Sun, L.C.: Research on performance of S-crowds anonymous communication protocol. J. Naval Univ. Eng. 20, 109–112 (2008)

    Google Scholar 

  12. Wu, Y.X., Huang, M.H., Wang, H.: An improved anonymous communication system based on crowds. Jiangxi Norm. Univ. (Natural Science) 33, 88–91 (2008)

    Google Scholar 

  13. Möller, U,, Cottrell, L., Palfrader, P., Sassaman, L.: Mixmaster protocol - version 2. Draft (2003). http://www.freehaven.net/anonbib

  14. Rennhard, M., Plattner, B.: Introducing MorphMix: peer-to-peer based anonymous internet usage with collusion detection. In: Proceeding WPES, Washington, DC, USA, pp. 91–102 (2002)

    Google Scholar 

  15. Freedman, M.J., Morris, R.: Tarzan: a peer-to-peer anonymizing network layer. In: Proceeding ACM CCS, Washington, DC, USA, pp. 193–206 (2002)

    Google Scholar 

  16. Dai, W.: PipeNet 1.1. (1996). http://www.eskimo.com/~weidai/pipenet.txt

  17. https://geti2p.net

  18. Kong, J., Hong, X.: ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks. In: Proceeding ACM MOBIHOC, Annapolis, Maryland, USA, pp. 291–302 (2003)

    Google Scholar 

  19. Seys, S., Preneel, B.: ARM: anonymous routing protocol for mobile ad hoc networks. Int. J. Wireless Mob. Comput. 3, 145–155 (2009)

    Article  Google Scholar 

  20. Pan, J., Li, J.: MASR: an efficient strong anonymous routing protocol for mobile ad hoc networks. In: Proceeding IEEE MASS, Beijing, China, pp. 1–6 (2009)

    Google Scholar 

  21. Jiang, R., Xing, Y.: Anonymous on-demand routing and secure checking of traffic forwarding for mobile ad hoc networks. In: Proceeding IEEE SRDS, Irvine, California, USA, pp. 406–411 (2012)

    Google Scholar 

  22. Li, T., Feng, Y., Wang, F., Fu, X.D.: A dynamic pseudonyms based anonymous routing protocol for wireless ad hoc networks. In: Proceeding IEEE MSN, Chengdu, China, pp. 82–86 (2012)

    Google Scholar 

  23. Zhang, Y., Liu, W., Lou, W.: Anonymous communications in mobile ad hoc networks. In: Proceeding IEEE INFOCOM, Miami, Florida, USA, pp. 1940–1951 (2005)

    Google Scholar 

  24. Zhu, B., Wan, Z., Kankanhalli, M.S., Bao, F., Deng, R.H.: Anonymous secure routing in mobile ad-hoc networks. In: Proceeding IEEE LCN, Tampa, Florida, USA, pp. 102–108 (2004)

    Google Scholar 

  25. Kalai Selvi, S., Ganeshkumar, V.: EARP: energy-aware anonymous routing protocol in MANETs. In: Proceeding ICACCCT, Ramanathapuram, India, pp. 1143–1147 (2014)

    Google Scholar 

  26. Liu, W., Yu, M.: AASR: authenticated anonymous secure routing for MANETs in adversarial environments. IEEE Trans. Veh. Technol. 63, 4585–4593 (2014)

    Article  Google Scholar 

Download references

Acknowledgment

This work is partially supported by the National Natural Science Foundation of China (61302113), the Shanghai Natural Science Foundation (13ZR1440800), the Shanghai Rising-Star Program (14QB1404400), Shanghai Key Laboratory of Specialty Fiber Optics and Optical Access Networks (SKLSFO 2014-03), the Science and Technology Innovation Program of Shanghai (14511101303) and Shanghai Sailing Program (15YF1414500, 14YF1408900).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lianhai Shan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Fang, W., Wang, J., Shi, Z., Li, F., Shan, L. (2016). A Study on Anonymous Communication Technology in MANET. In: Xie, J., Chen, Z., Douglas, C., Zhang, W., Chen, Y. (eds) High Performance Computing and Applications. HPCA 2015. Lecture Notes in Computer Science(), vol 9576. Springer, Cham. https://doi.org/10.1007/978-3-319-32557-6_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-32557-6_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-32556-9

  • Online ISBN: 978-3-319-32557-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics