Abstract
Offering secure and anonymous communications in mobile ad hoc networking environments is essential to promote confidence and widespread adoption of this kind of networks. In this paper we propose and implement a novel solution based on the Host Identity Protocol (HIP) that offers both security and user-level anonymity in MANET environments. In particular, we introduce enhancements to the authentication process to achieve Host Identity Tag (HIT) relationship anonymity, along with source/destination HIT anonymity when combined with multi-homing. We implemented our proposal in an experimental testbed, and the results obtained show that the performance degradation introduced by our proposal is minimal. We also detail how to efficiently integrate the proposed mechanism with both a reactive (DSR) and a proactive (OLSR) routing protocol. The improvements achieved using the routing-specific enhancements that we propose are then quantified analytically.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Wu, B., Chen, J., Wu, J., Cardei, M.: A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks. In: Wireless/Mobile Network Security. Springer, Heidelberg (2006)
Yih-Chun, H., Perrig, A.: A survey of secure wireless ad hoc routing. IEEE Security & Privacy Magazine 2(3), 28–39 (2004)
Chaum, D.: The dining cryptographers problem: Unconditional sender and recipient untraceability. J. Cryptology 1(1), 65–75 (1988)
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 4(2) (February 1981)
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium (August 2004)
Kong, J., Hong, X.: ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks. In: MobiHoc 2003: Proceedings of the 4th ACM International Symposium on Mobile Ad Hoc Networking & Computing, New York, NY, USA, pp. 291–302 (2003)
Zhang, Y., Liu, W., Lou, W., Fang, Y.: MASK: Anonymous on-demand routing in mobile ad hoc networks. Transactions on Wireless Communications 21, 2376–2385 (2006)
Lin, X., Lu, R., Zhu, H., Ho, P., Shen, X., Cao, Z.: ASRPAKE: An anonymous secure routing protocol with authenticated key exchange for wireless ad hoc networks. In: Proceedings of International Conference on Communications (ICC). IEEE, Los Alamitos(2007)
Paik, J.H., Kim, B.H., Lee, D.H.: A3RP: Anonymous and authenticated ad hoc routing protocol. In: Proceedings of International Conference on Information Security and Assurance. IEEE, Los Alamitos (2008)
Pfitzmann, A., Hansen, M.: Anonymity, unobservability, and pseudonymity - a proposal for terminology. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 1–9. Springer, Heidelberg (2001)
Moskowitz, R., Nikander, P., Jokela, P., Henderson, T.: Host Identity Protocol. RFC 5201 (April 2008)
Kent, S., Seo, K.: Security Architecture for the Internet Protocol. IETF RFC 4301 (December 2005)
Liu, J., Kong, J., Hong, X., Gerla, M.: Performance Evaluation of Anonymous Routing Protocols in MANETs. In: IEEE Wireless Communications and Networking Conference, New Orleans, USA (April 2006)
Nácher, M., Calafate, C.T., Cano, J.C., Manzoni, P.: Anonymous routing protocols: impact on performance in MANETs. In: IEEE International Symposium on Modelling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS 2009), London, UK (September 2009)
Internet Engineering Task Force. Host identity protocol working group charter, http://www.ietf.org/html.charters/hip-charter.html
Krawczyk, H.: SIGMA: the ’SIGn-and-MAc’ Approach to Authenticated Diffie-Hellman and its Use in the IKE Protocols. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 400–425. Springer, Heidelberg (2003)
IEEE 802.15.1(tm) IEEE Standard for Information technology–Telecommunications and information exchange between systems– Local and metropolitan area networks–Specific requirements Part 15.1: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Wireless Personal Area Networks (WPANs(tm)) (2002)
OpenHIP, http://downloads.sourceforge.net/openhip/hip-0.5.tgz
Ralink Technology Corporation, http://www.ralinktech.com/ (accessed: January 30, 2009)
The netfilter.org iptables project, http://www.netfilter.org/ (accessed: January 28, 2009)
Johnson, D.B., Hu, Y., Maltz, D.A.: The dynamic source routing protocol (dsr) for mobile ad hoc networks for ipv4. Request for Comments: 4728, MANET Working Group (February 2007) (work in progress), http://www.ietf.org/rfc/rfc4728.txt
Clausen, T., Jacquet, P.: Optimized link state routing protocol (OLSR). Request for Comments 3626, MANET Working Group (October 2003) (work in progress), http://www.ietf.org/rfc/rfc3626.txt
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Calafate, C.T., Campos, J., Nácher, M., Manzoni, P., Cano, JC. (2010). A-HIP: A Solution Offering Secure and Anonymous Communications in MANETs. In: Echizen, I., Kunihiro, N., Sasaki, R. (eds) Advances in Information and Computer Security. IWSEC 2010. Lecture Notes in Computer Science, vol 6434. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16825-3_15
Download citation
DOI: https://doi.org/10.1007/978-3-642-16825-3_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16824-6
Online ISBN: 978-3-642-16825-3
eBook Packages: Computer ScienceComputer Science (R0)