Skip to main content
Top

2016 | OriginalPaper | Chapter

A Multipath Routing Protocol Which Preserves Security and Anonymity of Data in Mobile Ad Hoc Networks

Authors : J Jaisooraj, M. K. Sulaiman, Manu J. Pillai

Published in: Computational Intelligence, Cyber Security and Computational Models

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Mobile Ad Hoc Networks (MANETs) have become a likely candidate for a wide range of threats. Each and every routing protocol in MANETs should preserve anonymity of mobile devices and data, along with unlinkability of data packets. With an aim of improving routing efficiency, many routing protocols either partially sacrificed anonymity or disregarded unlinkability. Here, we propose a multipath routing protocol that will enhance security as well as efficiency of routing in MANETs. Anonymity and unlinkability are completely preserved through the concepts of keyed hash chain and per-hop data packet appearance alteration. Also, the routing efficiency is enhanced through the formulation of a route selection parameter called Link Stability Metric (LSM) and the deployment of an elaborate route maintenance phase. The proposed system has been simulated and tested, and the results indicate that security as well as routing efficiency is enhanced considerably.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Pfitzmann, A., Hansen, M.: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management—A Consolidated Proposal for Terminology. Tech. Rep. Feb 2008 Pfitzmann, A., Hansen, M.: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management—A Consolidated Proposal for Terminology. Tech. Rep. Feb 2008
2.
go back to reference Yanchao Zhang, W.L., Liu, W., Fang, Y.: MASK: anonymous on-demand routing in mobile ad hoc networks. Trans. Wirel. Commun. IEEE 21, 2376–2385 (2006)CrossRef Yanchao Zhang, W.L., Liu, W., Fang, Y.: MASK: anonymous on-demand routing in mobile ad hoc networks. Trans. Wirel. Commun. IEEE 21, 2376–2385 (2006)CrossRef
3.
go back to reference Yang, L., Jakobsson, M., Wetzel, S.: Discount anonymous on demand routing for mobile ad hoc networks. In: SECURECOMM, vol. 6 (2006) Yang, L., Jakobsson, M., Wetzel, S.: Discount anonymous on demand routing for mobile ad hoc networks. In: SECURECOMM, vol. 6 (2006)
4.
go back to reference Chen, J.T., Boreli, R., Sivaraman, V.: TARo: trusted anonymous routing for MANETs. In: Sixth IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom-10). IEEE Computer Society, pp. 756–762 (2010) Chen, J.T., Boreli, R., Sivaraman, V.: TARo: trusted anonymous routing for MANETs. In: Sixth IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom-10). IEEE Computer Society, pp. 756–762 (2010)
5.
go back to reference Seys, S., Preneel, B.: ARM: anonymous routing protocol for mobile ad hoc networks. Int. J. Wirel. Mob. Comput. 3, 145–155 (2009)CrossRef Seys, S., Preneel, B.: ARM: anonymous routing protocol for mobile ad hoc networks. Int. J. Wirel. Mob. Comput. 3, 145–155 (2009)CrossRef
6.
go back to reference Boukerche, A., Ren, Y.: ARMA: an efficient secure ad hoc routing protocol. In: GLOBECOM, pp. 1268–1272 (2007) Boukerche, A., Ren, Y.: ARMA: an efficient secure ad hoc routing protocol. In: GLOBECOM, pp. 1268–1272 (2007)
7.
go back to reference Ghaderi, J., Srikant, R.: Towards a theory of anonymous networking. In: Proceedings of the 29th conference on Information communications, INFOCOM’10. IEEE Press, pp. 686–694 (2010) Ghaderi, J., Srikant, R.: Towards a theory of anonymous networking. In: Proceedings of the 29th conference on Information communications, INFOCOM’10. IEEE Press, pp. 686–694 (2010)
8.
go back to reference Boukerche, A., El-Khatib, K., Xu, L., Korba, L.: SDAR: a secure distributed anonymous routing protocol for wireless and mobile ad hoc networks. In: Annual IEEE Conference on Local Computer Networks, pp. 618–624 (2004) Boukerche, A., El-Khatib, K., Xu, L., Korba, L.: SDAR: a secure distributed anonymous routing protocol for wireless and mobile ad hoc networks. In: Annual IEEE Conference on Local Computer Networks, pp. 618–624 (2004)
9.
go back to reference Deng, H., Li, W., Agrawal, D.P.: Routing security in wireless ad hoc networks. IEEE Commun. Mag. 40(10) (2002) Deng, H., Li, W., Agrawal, D.P.: Routing security in wireless ad hoc networks. IEEE Commun. Mag. 40(10) (2002)
10.
go back to reference Rennhard, M., Plattner, B., Rafaeli, S., Mathy, L., Hutchison, D.: An architecture for an anonymity network. In: IEEE International Workshops on Enabling Technologies, p. 165 (2001) Rennhard, M., Plattner, B., Rafaeli, S., Mathy, L., Hutchison, D.: An architecture for an anonymity network. In: IEEE International Workshops on Enabling Technologies, p. 165 (2001)
11.
go back to reference Zhou, D.: Security Issues in Ad Hoc Networks. CRC Press, Inc (2003) Zhou, D.: Security Issues in Ad Hoc Networks. CRC Press, Inc (2003)
12.
go back to reference Lamport, L.: Password authentication with insecure communication. Commun. ACM 24, 770–772 (1981)CrossRef Lamport, L.: Password authentication with insecure communication. Commun. ACM 24, 770–772 (1981)CrossRef
13.
go back to reference Pfitzmann, A., Waidner, M.: Networks without user observability design options. Eurocrypt 85, 245–253 (1986) Pfitzmann, A., Waidner, M.: Networks without user observability design options. Eurocrypt 85, 245–253 (1986)
14.
go back to reference Upadhyaya, S., Gandhi, C.: Node Disjoint Multipath Routing Considering Link and Node Stability Protocol. IJCSI, Jan 2010 Upadhyaya, S., Gandhi, C.: Node Disjoint Multipath Routing Considering Link and Node Stability Protocol. IJCSI, Jan 2010
Metadata
Title
A Multipath Routing Protocol Which Preserves Security and Anonymity of Data in Mobile Ad Hoc Networks
Authors
J Jaisooraj
M. K. Sulaiman
Manu J. Pillai
Copyright Year
2016
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-0251-9_42

Premium Partner