Anonymous Routing in Wireless Mobile Ad Hoc Networks to Prevent Location Disclosure Attacks

  • Arjan Durresi
  • Vamsi Paruchuri
  • Mimoza Durresi
  • Leonard Barolli
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3823)

Abstract

Wireless Ad Hoc networks are particularly vulnerable due to their fundamental characteristics such as an open medium, dynamic topology, distributed cooperation and constrained capability. Location information of nodes can be critical in wireless ad hoc networks, especially in those deployed for military purposes. In this paper, we present a set of protocols for anonymous routing to prevent location disclosure attacks in wireless ad hoc networks.

Keywords

Intrusion Detection System Malicious Node Route Request Route Reply Black Hole Attack 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Karpijoki, V.: Security in Ad hoc Networks. In: Proceedings of the Helsinki University of Technology, Seminars on Network Security, Helsinki, Finland (2000)Google Scholar
  2. 2.
    Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network Magazine 13(6), 24–30 (1999)CrossRefGoogle Scholar
  3. 3.
    Lundberg, J.: Routing Security in Ad Hoc Networks, http://citeseer.nj.nec.com/400961.html
  4. 4.
    Stajano, F., Anderson, R.J.: The Resurrecting Duckling: Security Issues in Ad-Hoc Wireless Networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, pp. 172–182. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  5. 5.
    Deng, H., Li, W., Agrawal, D.: Routing Security in Wireless Ad Hoc Networks. IEEE Communications Magazine, 70–75 (October 2002)Google Scholar
  6. 6.
    Venkatraman, L., Agrawal, D.P.: Startegies for Enhancing Routing Security in Protocols for Mobile Ad hoc Networks. JPDC Special Issue on Mobile Ad Hoc Networking and Computing (accepted for publication)Google Scholar
  7. 7.
    Davis, C.R.: IPSec: Securing VPNs. McGraw-Hill, New York (2000)Google Scholar
  8. 8.
    Zhou, L., Haas, J.: Securing ad hoc networks. IEEE Network 13(6), 24–30 (1999)CrossRefGoogle Scholar
  9. 9.
    HuBaux, J.P., Buttyan, L., Capkun, S.: The quest for security in mobile ad hoc networks. In: Proc. ACM MobiHoc (October 2001)Google Scholar
  10. 10.
    Yi, S., Naldurg, P., Kravets, R.: Security-aware ad hoc routing for wireless networks. Technical Report UIUCDCS-R-2001- 2241, UILU-ENG-2001-1748, University of Illinois at Urbana-Champaign (August 2001)Google Scholar
  11. 11.
    Ni, S.Y., et al.: The Broadcast Storm Problem in a Mobile Ad Hoc Network. In: ACM MOBICOM, pp. 151–162 (August 1999)Google Scholar
  12. 12.
    Haas, Z.J., Halpern, J.Y., Li, L.: Gossip based Ad Hoc Routing. In: IEEE INFOCOM (June 2002)Google Scholar
  13. 13.
    Kachirski, O., Guha, R.: Intrusion Detection Using Mobile Agents in Wireless Ad Hoc Networks. IEEE Workshop on Knowledge Media NetworkingGoogle Scholar
  14. 14.
    Ramanujan, R., Kudige, S., Nguyen, T., Takkella, S., Adelstein, F.: Intrusion-Resistant Ad Hoc Wireless Networks. In: Proceedings of MILCOM 2002 (October 2002)Google Scholar
  15. 15.
    Zhang, Y., Lee, W.: Intrusion Detection in Wireless Ad-Hoc Networks. In: Proceedings of The Sixth International Conference on Mobile Computing and Networking, Boston, MA (August 2000)Google Scholar
  16. 16.
    Pfitzmann, A., Waidner, M.: Networks without user observability. Computer Security 6/2, 158–166 (1987)Google Scholar
  17. 17.
    Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for Web Transactions. ACM Transactions on Information and System Security 1(1), 66–92 (1998)CrossRefGoogle Scholar
  18. 18.
    Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communication of the ACM 24(2), 84–88 (1981)CrossRefGoogle Scholar
  19. 19.
    Pfitzmann, A., Pfitzmann, B., Waidner, M.: ISDN-MIXes - Untraceable communication with very small bandwidth overhead. In: Proc. Kommunikation in verteilten Systemen, pp. 451–463 (1991)Google Scholar
  20. 20.
    Rackoff, C., Simon, D.: Cryptographic defense against traffic analysis. In: Proc. of the 25th Annu. ACM Symp. on the Theory of Computing, pp. 672–681 (1993)Google Scholar
  21. 21.
    Syverson, P.F., Goldsclag, D.M., Reed, M.G.: Anonymous connections and onion routing. In: Proc. of IEEE Symposium on Security and Privacy, pp. 44–54 (1997)Google Scholar
  22. 22.
    Anonymizer - Online Privacy and Security, http://www.anonymizer.com
  23. 23.
    Niculescu, D., Nath, B.: Ad Hoc Positioning System (APS) using AoA. In: INFOCOM 2003, San Francisco, CA (2003)Google Scholar
  24. 24.
    Durresi, A., Paruchuri, V., Iyengar, S., Kannan, R.: Optimized Broadcast Protocol for Sensor Networks. IEEE Transactions on Computers 54(8), 1013–1024 (2005)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Arjan Durresi
    • 1
  • Vamsi Paruchuri
    • 1
  • Mimoza Durresi
    • 2
  • Leonard Barolli
    • 2
  1. 1.Department of Computer ScienceLouisiana State UniversityBaton RougeUSA
  2. 2.Department of Information and Communication Engineering, Faculty of Information EngineeringFukuoka Institute of TechnologyFukuokaJapan

Personalised recommendations