Abstract
This paper addresses the anonymous communications technology. Multiple hops, self-organization, no fixed facilities and limited computing resources of wireless ad hoc networks (MANET) make it hard to apply high complexity of a traditional network security algorithm. Security mechanisms can better solve the security issues of anonymous communication. This paper mainly studies the existing anonymous technology of traditional networks and MANET, and summarizes its advantages and disadvantages. With this article, readers can have a more thorough understanding of anonymous communication security and research trends in this area.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Yuan, J., Lu, J.F.: The research and application of terminal using in vehicle network. In: Proceeding IEEE ICEIEC, Beijing, China, pp. 305–308 (2013)
Sood, M., Kanwar, S.: Clustering in MANET and VANET: a survey. In: Proceeding CSCITA, Mumbai, Maharashtra, India, pp. 375–380 (2014)
Chen, X., Makki, K., Yen, K., Pissinou, N.: Sensor network security: a survey. IEEE Commun. Surv. Tut. 11, 52–73 (2009)
Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24, 84–90 (1981)
Golle, P., Jakobsson, M., Juels, A., Syverson, P.F.: Universal re-encryption for mixnets. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 163–178. Springer, Heidelberg (2004)
Gomułkiewicz, M., Klonowski, M., Kutyłowski, M.: Onions based on universal re-encryption – anonymous communication immune against repetitive attack. In: Lim, C.H., Yung, M. (eds.) WISA 2004. LNCS, vol. 3325, pp. 400–410. Springer, Heidelberg (2005)
Goldschlag, D., Reed, M., Syverson, P.: Onion routing. Commun. ACM 42, 39–41 (1999)
Zhao, F.X., Wang, Y.M., Wang, C.J.: An authenticated scheme of onion routing. Chin. J. Comput. 24, 463–467 (2001)
Li, L.H., Fu, S.F., Su, R.D., Che, X.Q.: Cryptanalysis of a hybrid-structured onion routing scheme. J. Commun. 34, 88–98 (2013)
Reiter, M.K., Rubin, A.D.: Crowds: anonymity for web transactions. ACM Trans. Inf. Syst. Secur. 1, 66–92 (1998)
Tao, T., Bao, R.D., Sun, L.C.: Research on performance of S-crowds anonymous communication protocol. J. Naval Univ. Eng. 20, 109–112 (2008)
Wu, Y.X., Huang, M.H., Wang, H.: An improved anonymous communication system based on crowds. Jiangxi Norm. Univ. (Natural Science) 33, 88–91 (2008)
Möller, U,, Cottrell, L., Palfrader, P., Sassaman, L.: Mixmaster protocol - version 2. Draft (2003). http://www.freehaven.net/anonbib
Rennhard, M., Plattner, B.: Introducing MorphMix: peer-to-peer based anonymous internet usage with collusion detection. In: Proceeding WPES, Washington, DC, USA, pp. 91–102 (2002)
Freedman, M.J., Morris, R.: Tarzan: a peer-to-peer anonymizing network layer. In: Proceeding ACM CCS, Washington, DC, USA, pp. 193–206 (2002)
Dai, W.: PipeNet 1.1. (1996). http://www.eskimo.com/~weidai/pipenet.txt
Kong, J., Hong, X.: ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks. In: Proceeding ACM MOBIHOC, Annapolis, Maryland, USA, pp. 291–302 (2003)
Seys, S., Preneel, B.: ARM: anonymous routing protocol for mobile ad hoc networks. Int. J. Wireless Mob. Comput. 3, 145–155 (2009)
Pan, J., Li, J.: MASR: an efficient strong anonymous routing protocol for mobile ad hoc networks. In: Proceeding IEEE MASS, Beijing, China, pp. 1–6 (2009)
Jiang, R., Xing, Y.: Anonymous on-demand routing and secure checking of traffic forwarding for mobile ad hoc networks. In: Proceeding IEEE SRDS, Irvine, California, USA, pp. 406–411 (2012)
Li, T., Feng, Y., Wang, F., Fu, X.D.: A dynamic pseudonyms based anonymous routing protocol for wireless ad hoc networks. In: Proceeding IEEE MSN, Chengdu, China, pp. 82–86 (2012)
Zhang, Y., Liu, W., Lou, W.: Anonymous communications in mobile ad hoc networks. In: Proceeding IEEE INFOCOM, Miami, Florida, USA, pp. 1940–1951 (2005)
Zhu, B., Wan, Z., Kankanhalli, M.S., Bao, F., Deng, R.H.: Anonymous secure routing in mobile ad-hoc networks. In: Proceeding IEEE LCN, Tampa, Florida, USA, pp. 102–108 (2004)
Kalai Selvi, S., Ganeshkumar, V.: EARP: energy-aware anonymous routing protocol in MANETs. In: Proceeding ICACCCT, Ramanathapuram, India, pp. 1143–1147 (2014)
Liu, W., Yu, M.: AASR: authenticated anonymous secure routing for MANETs in adversarial environments. IEEE Trans. Veh. Technol. 63, 4585–4593 (2014)
Acknowledgment
This work is partially supported by the National Natural Science Foundation of China (61302113), the Shanghai Natural Science Foundation (13ZR1440800), the Shanghai Rising-Star Program (14QB1404400), Shanghai Key Laboratory of Specialty Fiber Optics and Optical Access Networks (SKLSFO 2014-03), the Science and Technology Innovation Program of Shanghai (14511101303) and Shanghai Sailing Program (15YF1414500, 14YF1408900).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Fang, W., Wang, J., Shi, Z., Li, F., Shan, L. (2016). A Study on Anonymous Communication Technology in MANET. In: Xie, J., Chen, Z., Douglas, C., Zhang, W., Chen, Y. (eds) High Performance Computing and Applications. HPCA 2015. Lecture Notes in Computer Science(), vol 9576. Springer, Cham. https://doi.org/10.1007/978-3-319-32557-6_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-32557-6_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-32556-9
Online ISBN: 978-3-319-32557-6
eBook Packages: Computer ScienceComputer Science (R0)