Skip to main content
Log in

An anonymous distributed routing protocol in mobile ad-hoc networks

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

This paper proposes an efficient anonymous routing protocol for mobile ad hoc networks (MANETs). This protocol considers symmetric and asymmetric links during the wireless communication of MANETs. A MANET is one type of self-organized wireless network that can be formed by several wireless devices such as laptops, tablet PCs, and smartphones. Different wireless transmission ranges of different mobile devices lead to a special communication condition called an asymmetric link. Most research on this topic focuses on providing security and anonymity for the symmetric link without considering the asymmetric link. This paper proposes a novel distributed routing protocol beyond the symmetric and asymmetric links. This protocol guarantees the security, anonymity, and high reliability of an established route by avoiding unreliable intermediate nodes. The routes generated by the proposed protocol are shorter than previous research. The proposed protocol enhances MANET performance in assuring security and anonymity.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Boukerche A, El-Khatib K, Xu L, Korba L (2005) An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks. Comput Commun 28(10):1193–1203

    Article  Google Scholar 

  2. Chen J, Boreli R, Sivaraman V (2012) Improving the efficiency of anonymous routing for MANETs. Comput Commun 35(5):619–627

    Article  Google Scholar 

  3. Chen S, Xu L, Chen Z (2007) Secure anonymous routing in trust and clustered wireless ad hoc networks. In: Second international conference on communications and networking in China, 22–24 August 2007, pp 994–998

    Google Scholar 

  4. Djenouri D, Khelladi L, Badache AN (2005) A survey of security issues in mobile ad hoc and sensor networks. IEEE Commun Surv Tutor 7(4):2–28

    Article  Google Scholar 

  5. Dang L, Xu J, Li H, Dang N (2010) DASR: distributed anonymous secure routing with good scalability for mobile ad hoc networks. In: IEEE Asia–Pacific services computing conference (APSCC), 6–10 December 2010, pp 454–461

    Google Scholar 

  6. Deng J, Han R, Mishra S (2006) INSENS: intrusion-tolerant routing for wireless sensor networks. Comput Commun 29(2):216–230

    Article  Google Scholar 

  7. Douceur JR, Donath JS (2002) The Sybil attack. In: The 1st international workshop on peer-to-peer systems (IPTPS), pp 251–260

    Chapter  Google Scholar 

  8. Dong Y, Chim T, Li OK, Yiu SM, Hui CK (2009) ARMR: anonymous routing protocol with multiple routes for communications in mobile ad hoc networks. Ad Hoc Netw 7(8):1536–1550

    Article  Google Scholar 

  9. Henry R, Goldberg I (2011) Formalizing anonymous blacklisting systems. In: Proceedings of the 2011 IEEE symposium on security and privacy (SP ’11), Oakland, USA, 22–25 May 2011

    Google Scholar 

  10. Hu Y-C, Perrig A, Johnson DB (2002) Ariadne: a secure on-demand routing protocol for ad hoc networks. In: Proceedings of the 8th annual international conference on mobile computing and networking (MobiCom ’02). ACM, New York, pp 12–23

    Chapter  Google Scholar 

  11. Hu Y, Johnson D, Perrig A (2002) SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. In: Proceedings workshop on mobile computing systems and applications, June 2002

    Google Scholar 

  12. Hu YC, Perrig A, Johnson DB (2003) Rushing attacks and defense in wireless ad hoc network routing protocols. In: Proceedings of the 2nd ACM workshop on wireless security (WiSe ’03), New York, NY, USA, pp 30–40

    Google Scholar 

  13. Jiang T, Li Q, Ruan Y (2004) Secure dynamic source routing protocol. In: Proceedings of the fourth international conference on computer and information technology (CIT ’04), Washington, DC, USA, pp 528–533

    Google Scholar 

  14. Johnson DB, Maltz DA, Broch J (2001) The dynamic source routing protocol for multihop wireless ad hoc networks. In: Ad hoc networking, pp 139–172

    Google Scholar 

  15. Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw 1(2–3):293–315

    Article  Google Scholar 

  16. Kargl F, Geis A, Schlott S, Weber M (2005) Secure dynamic source routing. In: Proceedings of the 38th annual Hawaii international conference on system sciences (HICSS ’05), Washington, DC, USA

    Google Scholar 

  17. Kim J, Tsudik G (2009) SRDP: secure route discovery for dynamic source routing in MANETs. Ad Hoc Netw 7(6):1097–1109

    Article  Google Scholar 

  18. Kong J, Hong XY (2003) ANODR anonymous on demand routing with untraceable routes for mobile ad-hoc networks. In: Proceedings of the 4th ACM international symposium on mobile ad hoc networking & computing (MobiHoc ’03), 14–19 September 2003. ACM, New York, pp 291–302

    Chapter  Google Scholar 

  19. Mavropodi R, Kotzanikolaou P, Douligeris C (2007) SecMR—a secure multipath routing protocol for ad hoc networks. Ad Hoc Netw 5(1):87–99

    Article  Google Scholar 

  20. Song R, Korba L, Yee G (2005) AnonDSR: efficient anonymous dynamic source routing for mobile ad-hoc networks. In: Proceedings of the 3rd ACM workshop on security of ad hoc and sensor networks (SASN ’05), New York, NY, USA, pp 33–42

    Chapter  Google Scholar 

  21. Su MY (2010) WARP: a wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks. Comput Secur 29(2):208–224

    Article  Google Scholar 

  22. Perkins C, Belding-Royer E, Das S Ad hoc on-demand distance vector (AODV) routing. IETF. RFC 3561. Retrieved 2010-06-18

  23. Paik JH, Kim BH, Lee DH (2008) A3RP: anonymous and authenticated ad hoc routing protocol. In: International conference on information security and assurance, 24–26 April 2008, pp 67–72

    Google Scholar 

  24. Tseng FH, Chou LD, Chao HC (2011) A survey of black hole attacks in wireless mobile ad hoc networks. Hum-Centr Comput Inf Sci 1(1):4

    Article  Google Scholar 

Download references

Acknowledgement

The authors would like to thank anonymous reviewers for their important suggestions to improve this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ren-Junn Hwang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Hwang, RJ., Hsiao, YK. An anonymous distributed routing protocol in mobile ad-hoc networks. J Supercomput 66, 888–906 (2013). https://doi.org/10.1007/s11227-013-0920-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-013-0920-0

Keywords

Navigation