skip to main content
research-article

LISISAP: link level signature based secure anonymous protocol for prevention of traffic analysis attacks

Published: 14 March 2011 Publication History

Abstract

For any communication (wired or wireless) such as control and data, the identity of source and destination is revealed in the header portion of the packet. Adversaries obtain sensitive in-formation such as the identity, location of a critical node, route, data, etc., during communication by using traffic analysis at-tacks, viz., similarity attack, data integrity attack, packet count-ing attack, latency attack, and clogging attack. Anonymous communication prevents adversaries from doing traffic analysis against the routing information embedded in the routing mes-sages and data packets. In order to thwart such traffic analysis, anonymous communication protocols were developed. In this paper, the existing anonymous communication protocols were analyzed in terms of techniques used, challenges, and applications. Anonymous Routing protocol with Multiple Routes (ARMR) is one of the existing protocols that achieves better route anonymity using fake routes and multiple paths. However, in ARMR, adversaries can modify the data with genuine user pseudonyms and send the modified data to the destination. In order to prevent data modification by adversary at link level, in this paper a Link level SIgnature based Secure Anonymous Protocol (LISISAP) protocol is proposed. In LISISAP, source node generates a signature for the data and sends the signature along with the encrypted data to the next node. Further, the next node verifies the signature. If signature matches, it generates its own signature and sends the encrypted data to its next node. Otherwise, it discards the packet. Verified data and signature are sent by each intermediate node until it reaches the destina-tion. In LISISAP, even if adversaries modify the data, every node in the route including the destination node verifies the data and discards the data if there is no match in the signature. Similarity attacks can be prevented by making the data look different on each hop which could be achieved by encrypting the data with link key. Proposed protocol, LISISAP is imple-mented and tested in Smart and Secure Network. From the ex-perimental results, it is evident that the data generated by source node is sent anonymously to the destination. Thus, in LISISAP protocol, communication is secure between nodes without revealing the node identities. Anonymous properties such as identity privacy, location privacy, route anonymity, and robustness against several attacks were achieved.

References

[1]
Matthew Edman, Bulent Yener, On Anonymity in an Electronic Society: A Survey of Anonymous Communication Systems, ACM Computer Survey, pp.1--39, 2008.
[2]
Ying Dong, Tat Wing Chim, Victor O. K. Li, Siu-Ming Yiu, C. K. Hui, "ARMR: Anonymous routing protocol with multiple routes for communications in mobile ad hoc networks", Ad Hoc Networks, Elsevier Publications, 7(8): pp. 1536--1550, 2009.
[3]
V. Fusenig, D. Spiewak, and T. Engel. "Acimn: A protocol for anonymous communication in multi hop wireless networks", In L. Brankovic and M. Miller, editors, Sixth Australasian Information Security Conference (AISC 2008), CRPIT.
[4]
Zhang, Y., Liu, W., Lou, W. and Fang, Y., "Mask: Anonymous on-demand routing in mobile ad hoc networks", in IEEE Transactions on Wireless Communications', Vol.5 No.9, pp. 2376--2385, 2006.
[5]
R. Song, L. Korba, G. Yee, "AnonDSR: efficient anonymous dynamic source routing for mobile ad-hoc networks", Proc. of ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'05), Alexandria, VA, USA, 2005, pp. 33--42.
[6]
L. Bao, "A New Approach to Anonymous Multicast Routing in Ad Hoc Networks", In Proc. of The Second International Conference on Communications and Networking in China (CHINACOM), Shanghai, China, August 21-24, 2007.
[7]
Chao-Chin Chou, David S. L. Wei, C.-C. Jay Kuo, and Kshirasagar Naik, "Anonymous Peer-to-Peer Commu-nication Protocol over Mobile Ad-hoc Networks", 49th Annual IEEE Global Telecommunications Conference, San Francisco, CA, 2006.

Index Terms

  1. LISISAP: link level signature based secure anonymous protocol for prevention of traffic analysis attacks

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM SIGSOFT Software Engineering Notes
        ACM SIGSOFT Software Engineering Notes  Volume 36, Issue 2
        March 2011
        116 pages
        ISSN:0163-5948
        DOI:10.1145/1943371
        Issue’s Table of Contents

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 14 March 2011
        Published in SIGSOFT Volume 36, Issue 2

        Check for updates

        Author Tags

        1. anonymous communication
        2. routing protocols
        3. traffic analysis

        Qualifiers

        • Research-article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • 0
          Total Citations
        • 258
          Total Downloads
        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 07 Mar 2025

        Other Metrics

        Citations

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media