Skip to main content

A-HIP: A Solution Offering Secure and Anonymous Communications in MANETs

  • Conference paper
Book cover Advances in Information and Computer Security (IWSEC 2010)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6434))

Included in the following conference series:

Abstract

Offering secure and anonymous communications in mobile ad hoc networking environments is essential to promote confidence and widespread adoption of this kind of networks. In this paper we propose and implement a novel solution based on the Host Identity Protocol (HIP) that offers both security and user-level anonymity in MANET environments. In particular, we introduce enhancements to the authentication process to achieve Host Identity Tag (HIT) relationship anonymity, along with source/destination HIT anonymity when combined with multi-homing. We implemented our proposal in an experimental testbed, and the results obtained show that the performance degradation introduced by our proposal is minimal. We also detail how to efficiently integrate the proposed mechanism with both a reactive (DSR) and a proactive (OLSR) routing protocol. The improvements achieved using the routing-specific enhancements that we propose are then quantified analytically.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Wu, B., Chen, J., Wu, J., Cardei, M.: A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks. In: Wireless/Mobile Network Security. Springer, Heidelberg (2006)

    Google Scholar 

  2. Yih-Chun, H., Perrig, A.: A survey of secure wireless ad hoc routing. IEEE Security & Privacy Magazine 2(3), 28–39 (2004)

    Article  Google Scholar 

  3. Chaum, D.: The dining cryptographers problem: Unconditional sender and recipient untraceability. J. Cryptology 1(1), 65–75 (1988)

    Article  MathSciNet  MATH  Google Scholar 

  4. Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 4(2) (February 1981)

    Google Scholar 

  5. Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium (August 2004)

    Google Scholar 

  6. Kong, J., Hong, X.: ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks. In: MobiHoc 2003: Proceedings of the 4th ACM International Symposium on Mobile Ad Hoc Networking & Computing, New York, NY, USA, pp. 291–302 (2003)

    Google Scholar 

  7. Zhang, Y., Liu, W., Lou, W., Fang, Y.: MASK: Anonymous on-demand routing in mobile ad hoc networks. Transactions on Wireless Communications 21, 2376–2385 (2006)

    Article  Google Scholar 

  8. Lin, X., Lu, R., Zhu, H., Ho, P., Shen, X., Cao, Z.: ASRPAKE: An anonymous secure routing protocol with authenticated key exchange for wireless ad hoc networks. In: Proceedings of International Conference on Communications (ICC). IEEE, Los Alamitos(2007)

    Google Scholar 

  9. Paik, J.H., Kim, B.H., Lee, D.H.: A3RP: Anonymous and authenticated ad hoc routing protocol. In: Proceedings of International Conference on Information Security and Assurance. IEEE, Los Alamitos (2008)

    Google Scholar 

  10. Pfitzmann, A., Hansen, M.: Anonymity, unobservability, and pseudonymity - a proposal for terminology. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 1–9. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  11. Moskowitz, R., Nikander, P., Jokela, P., Henderson, T.: Host Identity Protocol. RFC 5201 (April 2008)

    Google Scholar 

  12. Kent, S., Seo, K.: Security Architecture for the Internet Protocol. IETF RFC 4301 (December 2005)

    Google Scholar 

  13. Liu, J., Kong, J., Hong, X., Gerla, M.: Performance Evaluation of Anonymous Routing Protocols in MANETs. In: IEEE Wireless Communications and Networking Conference, New Orleans, USA (April 2006)

    Google Scholar 

  14. Nácher, M., Calafate, C.T., Cano, J.C., Manzoni, P.: Anonymous routing protocols: impact on performance in MANETs. In: IEEE International Symposium on Modelling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS 2009), London, UK (September 2009)

    Google Scholar 

  15. Internet Engineering Task Force. Host identity protocol working group charter, http://www.ietf.org/html.charters/hip-charter.html

  16. Krawczyk, H.: SIGMA: the ’SIGn-and-MAc’ Approach to Authenticated Diffie-Hellman and its Use in the IKE Protocols. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 400–425. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  17. IEEE 802.15.1(tm) IEEE Standard for Information technology–Telecommunications and information exchange between systems– Local and metropolitan area networks–Specific requirements Part 15.1: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Wireless Personal Area Networks (WPANs(tm)) (2002)

    Google Scholar 

  18. OpenHIP, http://downloads.sourceforge.net/openhip/hip-0.5.tgz

  19. Ralink Technology Corporation, http://www.ralinktech.com/ (accessed: January 30, 2009)

  20. The netfilter.org iptables project, http://www.netfilter.org/ (accessed: January 28, 2009)

  21. Johnson, D.B., Hu, Y., Maltz, D.A.: The dynamic source routing protocol (dsr) for mobile ad hoc networks for ipv4. Request for Comments: 4728, MANET Working Group (February 2007) (work in progress), http://www.ietf.org/rfc/rfc4728.txt

  22. Clausen, T., Jacquet, P.: Optimized link state routing protocol (OLSR). Request for Comments 3626, MANET Working Group (October 2003) (work in progress), http://www.ietf.org/rfc/rfc3626.txt

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Calafate, C.T., Campos, J., Nácher, M., Manzoni, P., Cano, JC. (2010). A-HIP: A Solution Offering Secure and Anonymous Communications in MANETs. In: Echizen, I., Kunihiro, N., Sasaki, R. (eds) Advances in Information and Computer Security. IWSEC 2010. Lecture Notes in Computer Science, vol 6434. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16825-3_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16825-3_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16824-6

  • Online ISBN: 978-3-642-16825-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics