EUC 2005: Embedded and Ubiquitous Computing – EUC 2005 Workshops pp 238-247 | Cite as
Anonymous Routing in Wireless Mobile Ad Hoc Networks to Prevent Location Disclosure Attacks
Conference paper
Abstract
Wireless Ad Hoc networks are particularly vulnerable due to their fundamental characteristics such as an open medium, dynamic topology, distributed cooperation and constrained capability. Location information of nodes can be critical in wireless ad hoc networks, especially in those deployed for military purposes. In this paper, we present a set of protocols for anonymous routing to prevent location disclosure attacks in wireless ad hoc networks.
Keywords
Intrusion Detection System Malicious Node Route Request Route Reply Black Hole Attack
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Download
to read the full conference paper text
References
- 1.Karpijoki, V.: Security in Ad hoc Networks. In: Proceedings of the Helsinki University of Technology, Seminars on Network Security, Helsinki, Finland (2000)Google Scholar
- 2.Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network Magazine 13(6), 24–30 (1999)CrossRefGoogle Scholar
- 3.Lundberg, J.: Routing Security in Ad Hoc Networks, http://citeseer.nj.nec.com/400961.html
- 4.Stajano, F., Anderson, R.J.: The Resurrecting Duckling: Security Issues in Ad-Hoc Wireless Networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, pp. 172–182. Springer, Heidelberg (2000)CrossRefGoogle Scholar
- 5.Deng, H., Li, W., Agrawal, D.: Routing Security in Wireless Ad Hoc Networks. IEEE Communications Magazine, 70–75 (October 2002)Google Scholar
- 6.Venkatraman, L., Agrawal, D.P.: Startegies for Enhancing Routing Security in Protocols for Mobile Ad hoc Networks. JPDC Special Issue on Mobile Ad Hoc Networking and Computing (accepted for publication)Google Scholar
- 7.Davis, C.R.: IPSec: Securing VPNs. McGraw-Hill, New York (2000)Google Scholar
- 8.Zhou, L., Haas, J.: Securing ad hoc networks. IEEE Network 13(6), 24–30 (1999)CrossRefGoogle Scholar
- 9.HuBaux, J.P., Buttyan, L., Capkun, S.: The quest for security in mobile ad hoc networks. In: Proc. ACM MobiHoc (October 2001)Google Scholar
- 10.Yi, S., Naldurg, P., Kravets, R.: Security-aware ad hoc routing for wireless networks. Technical Report UIUCDCS-R-2001- 2241, UILU-ENG-2001-1748, University of Illinois at Urbana-Champaign (August 2001)Google Scholar
- 11.Ni, S.Y., et al.: The Broadcast Storm Problem in a Mobile Ad Hoc Network. In: ACM MOBICOM, pp. 151–162 (August 1999)Google Scholar
- 12.Haas, Z.J., Halpern, J.Y., Li, L.: Gossip based Ad Hoc Routing. In: IEEE INFOCOM (June 2002)Google Scholar
- 13.Kachirski, O., Guha, R.: Intrusion Detection Using Mobile Agents in Wireless Ad Hoc Networks. IEEE Workshop on Knowledge Media NetworkingGoogle Scholar
- 14.Ramanujan, R., Kudige, S., Nguyen, T., Takkella, S., Adelstein, F.: Intrusion-Resistant Ad Hoc Wireless Networks. In: Proceedings of MILCOM 2002 (October 2002)Google Scholar
- 15.Zhang, Y., Lee, W.: Intrusion Detection in Wireless Ad-Hoc Networks. In: Proceedings of The Sixth International Conference on Mobile Computing and Networking, Boston, MA (August 2000)Google Scholar
- 16.Pfitzmann, A., Waidner, M.: Networks without user observability. Computer Security 6/2, 158–166 (1987)Google Scholar
- 17.Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for Web Transactions. ACM Transactions on Information and System Security 1(1), 66–92 (1998)CrossRefGoogle Scholar
- 18.Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communication of the ACM 24(2), 84–88 (1981)CrossRefGoogle Scholar
- 19.Pfitzmann, A., Pfitzmann, B., Waidner, M.: ISDN-MIXes - Untraceable communication with very small bandwidth overhead. In: Proc. Kommunikation in verteilten Systemen, pp. 451–463 (1991)Google Scholar
- 20.Rackoff, C., Simon, D.: Cryptographic defense against traffic analysis. In: Proc. of the 25th Annu. ACM Symp. on the Theory of Computing, pp. 672–681 (1993)Google Scholar
- 21.Syverson, P.F., Goldsclag, D.M., Reed, M.G.: Anonymous connections and onion routing. In: Proc. of IEEE Symposium on Security and Privacy, pp. 44–54 (1997)Google Scholar
- 22.Anonymizer - Online Privacy and Security, http://www.anonymizer.com
- 23.Niculescu, D., Nath, B.: Ad Hoc Positioning System (APS) using AoA. In: INFOCOM 2003, San Francisco, CA (2003)Google Scholar
- 24.Durresi, A., Paruchuri, V., Iyengar, S., Kannan, R.: Optimized Broadcast Protocol for Sensor Networks. IEEE Transactions on Computers 54(8), 1013–1024 (2005)CrossRefGoogle Scholar
Copyright information
© Springer-Verlag Berlin Heidelberg 2005