Skip to main content

Onion Routing in Deterministic Delay Tolerant Networks

Part of the Lecture Notes in Computer Science book series (LNSC,volume 9482)

Abstract

Deterministic DTNs are networks where the behavior is known in advance or where a repetitive action occurs over time like in public transportation networks. This work proposes the application of an onion routing approach to deterministic DTNs to achieve anonymous communications. We show how the prior stage of path selection in onion routing can be achieved using the information provided by deterministic networks.

Keywords

  • Malicious Node
  • Path Selection
  • Delay Tolerant Network
  • Dynamic Graph
  • Anonymous Communication

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-319-30303-1_21
  • Chapter length: 8 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   54.99
Price excludes VAT (USA)
  • ISBN: 978-3-319-30303-1
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   69.99
Price excludes VAT (USA)
Fig. 1.
Fig. 2.

References

  1. Bhutta, N., Ansa, G., Johnson, E., Ahmad, N., Alsiyabi, M., Cruickshank, H.: Security analysis for delay/disruption tolerant satellite and sensor networks. In: International Workshop on Satellite and Space Communications, IWSSC 2009, pp. 385–389 (2009)

    Google Scholar 

  2. Cardei, I., Liu, C., Wu, J., Yuan, Q.: DTN routing with probabilistic trajectory prediction. In: Li, Y., Huynh, D.T., Das, S.K., Du, D.-Z. (eds.) WASA 2008. LNCS, vol. 5258, pp. 40–51. Springer, Heidelberg (2008)

    CrossRef  Google Scholar 

  3. Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: USENIX Security Symposium. USENIX Association (2004)

    Google Scholar 

  4. DLR: SUMO - Simulation of Urban MObility, Insitute if Transportation Systems, Deutsches Zentrum für Luft- und Raumfahrt (DLR)

    Google Scholar 

  5. Evans, N.S., Dingledine, R., Grothoff, C.: A practical congestion attack on tor using long paths. In: USENIX Security Symposium, pp. 33–50 (2009)

    Google Scholar 

  6. Farrell, S., Cahill, V.: Delay- and Disruption-Tolerant Networking. Artech House, Norwood (2006)

    Google Scholar 

  7. Feamster, N., Dingledine, R.: Location diversity in anonymity networks. In: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, pp. 66–76. ACM (2004)

    Google Scholar 

  8. Goldschlag, D., Reed, M., Syverson, P.: Hiding routing information. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 137–150. Springer, Heidelberg (1996)

    CrossRef  Google Scholar 

  9. Hay, D., Giaccone, P.: Optimal routing and scheduling for deterministic delay tolerant networks. In: Sixth International Conference on Wireless On-Demand Network Systems and Services, WONS 2009, pp. 27–34. IEEE (2009)

    Google Scholar 

  10. Hopper, N., Vasserman, E.Y., Chan-Tin, E.: How much anonymity does network latency leak? ACM Trans. Inf. Syst. Secur. 13(2), 13:1–13:28 (2010)

    CrossRef  Google Scholar 

  11. Jain, S., Fall, K., Patra, R.: Routing in a delay tolerant network, vol. 34. ACM (2004)

    Google Scholar 

  12. OSM: JOSM, OpenStreetMap (OSM). https://josm.openstreetmap.de

  13. Nsnam: NS-3 webpage. https://www.nsnam.org

  14. Raj, C., Upadhayaya, U., Makwana, T., Mahida, P.: Simulation of vanet using NS-3 and SUMO. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 4, 563–569 (2014)

    Google Scholar 

  15. Reed, M.G., Syverson, P.F., Goldschlag, D.M.: Anonymous connections and onion routing. IEEE J. Select. Areas Commun. 16(4), 482–494 (1998)

    CrossRef  Google Scholar 

  16. Shi, C., Luo, X., Traynor, P., Ammar, M.H., Zegura, E.W.: Arden: anonymous networking in delay tolerant networks. Ad Hoc Netw. 10(6), 918–930 (2012)

    CrossRef  Google Scholar 

  17. Tor Project. https://www.torproject.org/

  18. Vakde, G., Bibikar, R., Le, Z., Wright, M.: Enpassant: anonymous routing for disruption-tolerant networks with applications in assistive environments. Secur. Commun. Netw. 4(11), 1243–1256 (2011)

    CrossRef  Google Scholar 

  19. Zhou, D.: DTN Bundle Protocol. https://www.nsnam.org/wiki/Current_Development

Download references

Acknowledgments

Support by Spanish MINECO project TIN2014–55243-P, and Catalan AGAUR project 2014-SGR-691, is acknowledged.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guillermo Navarro-Arribas .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Antunez-Veas, A., Navarro-Arribas, G. (2016). Onion Routing in Deterministic Delay Tolerant Networks. In: Garcia-Alfaro, J., Kranakis, E., Bonfante, G. (eds) Foundations and Practice of Security. FPS 2015. Lecture Notes in Computer Science(), vol 9482. Springer, Cham. https://doi.org/10.1007/978-3-319-30303-1_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-30303-1_21

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-30302-4

  • Online ISBN: 978-3-319-30303-1

  • eBook Packages: Computer ScienceComputer Science (R0)