Skip to main content
Erschienen in: The Journal of Supercomputing 2/2013

01.11.2013

An anonymous distributed routing protocol in mobile ad-hoc networks

verfasst von: Ren-Junn Hwang, Yu-Kai Hsiao

Erschienen in: The Journal of Supercomputing | Ausgabe 2/2013

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper proposes an efficient anonymous routing protocol for mobile ad hoc networks (MANETs). This protocol considers symmetric and asymmetric links during the wireless communication of MANETs. A MANET is one type of self-organized wireless network that can be formed by several wireless devices such as laptops, tablet PCs, and smartphones. Different wireless transmission ranges of different mobile devices lead to a special communication condition called an asymmetric link. Most research on this topic focuses on providing security and anonymity for the symmetric link without considering the asymmetric link. This paper proposes a novel distributed routing protocol beyond the symmetric and asymmetric links. This protocol guarantees the security, anonymity, and high reliability of an established route by avoiding unreliable intermediate nodes. The routes generated by the proposed protocol are shorter than previous research. The proposed protocol enhances MANET performance in assuring security and anonymity.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Boukerche A, El-Khatib K, Xu L, Korba L (2005) An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks. Comput Commun 28(10):1193–1203 CrossRef Boukerche A, El-Khatib K, Xu L, Korba L (2005) An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks. Comput Commun 28(10):1193–1203 CrossRef
2.
Zurück zum Zitat Chen J, Boreli R, Sivaraman V (2012) Improving the efficiency of anonymous routing for MANETs. Comput Commun 35(5):619–627 CrossRef Chen J, Boreli R, Sivaraman V (2012) Improving the efficiency of anonymous routing for MANETs. Comput Commun 35(5):619–627 CrossRef
3.
Zurück zum Zitat Chen S, Xu L, Chen Z (2007) Secure anonymous routing in trust and clustered wireless ad hoc networks. In: Second international conference on communications and networking in China, 22–24 August 2007, pp 994–998 Chen S, Xu L, Chen Z (2007) Secure anonymous routing in trust and clustered wireless ad hoc networks. In: Second international conference on communications and networking in China, 22–24 August 2007, pp 994–998
4.
Zurück zum Zitat Djenouri D, Khelladi L, Badache AN (2005) A survey of security issues in mobile ad hoc and sensor networks. IEEE Commun Surv Tutor 7(4):2–28 CrossRef Djenouri D, Khelladi L, Badache AN (2005) A survey of security issues in mobile ad hoc and sensor networks. IEEE Commun Surv Tutor 7(4):2–28 CrossRef
5.
Zurück zum Zitat Dang L, Xu J, Li H, Dang N (2010) DASR: distributed anonymous secure routing with good scalability for mobile ad hoc networks. In: IEEE Asia–Pacific services computing conference (APSCC), 6–10 December 2010, pp 454–461 Dang L, Xu J, Li H, Dang N (2010) DASR: distributed anonymous secure routing with good scalability for mobile ad hoc networks. In: IEEE Asia–Pacific services computing conference (APSCC), 6–10 December 2010, pp 454–461
6.
Zurück zum Zitat Deng J, Han R, Mishra S (2006) INSENS: intrusion-tolerant routing for wireless sensor networks. Comput Commun 29(2):216–230 CrossRef Deng J, Han R, Mishra S (2006) INSENS: intrusion-tolerant routing for wireless sensor networks. Comput Commun 29(2):216–230 CrossRef
7.
Zurück zum Zitat Douceur JR, Donath JS (2002) The Sybil attack. In: The 1st international workshop on peer-to-peer systems (IPTPS), pp 251–260 CrossRef Douceur JR, Donath JS (2002) The Sybil attack. In: The 1st international workshop on peer-to-peer systems (IPTPS), pp 251–260 CrossRef
8.
Zurück zum Zitat Dong Y, Chim T, Li OK, Yiu SM, Hui CK (2009) ARMR: anonymous routing protocol with multiple routes for communications in mobile ad hoc networks. Ad Hoc Netw 7(8):1536–1550 CrossRef Dong Y, Chim T, Li OK, Yiu SM, Hui CK (2009) ARMR: anonymous routing protocol with multiple routes for communications in mobile ad hoc networks. Ad Hoc Netw 7(8):1536–1550 CrossRef
9.
Zurück zum Zitat Henry R, Goldberg I (2011) Formalizing anonymous blacklisting systems. In: Proceedings of the 2011 IEEE symposium on security and privacy (SP ’11), Oakland, USA, 22–25 May 2011 Henry R, Goldberg I (2011) Formalizing anonymous blacklisting systems. In: Proceedings of the 2011 IEEE symposium on security and privacy (SP ’11), Oakland, USA, 22–25 May 2011
10.
Zurück zum Zitat Hu Y-C, Perrig A, Johnson DB (2002) Ariadne: a secure on-demand routing protocol for ad hoc networks. In: Proceedings of the 8th annual international conference on mobile computing and networking (MobiCom ’02). ACM, New York, pp 12–23 CrossRef Hu Y-C, Perrig A, Johnson DB (2002) Ariadne: a secure on-demand routing protocol for ad hoc networks. In: Proceedings of the 8th annual international conference on mobile computing and networking (MobiCom ’02). ACM, New York, pp 12–23 CrossRef
11.
Zurück zum Zitat Hu Y, Johnson D, Perrig A (2002) SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. In: Proceedings workshop on mobile computing systems and applications, June 2002 Hu Y, Johnson D, Perrig A (2002) SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. In: Proceedings workshop on mobile computing systems and applications, June 2002
12.
Zurück zum Zitat Hu YC, Perrig A, Johnson DB (2003) Rushing attacks and defense in wireless ad hoc network routing protocols. In: Proceedings of the 2nd ACM workshop on wireless security (WiSe ’03), New York, NY, USA, pp 30–40 Hu YC, Perrig A, Johnson DB (2003) Rushing attacks and defense in wireless ad hoc network routing protocols. In: Proceedings of the 2nd ACM workshop on wireless security (WiSe ’03), New York, NY, USA, pp 30–40
13.
Zurück zum Zitat Jiang T, Li Q, Ruan Y (2004) Secure dynamic source routing protocol. In: Proceedings of the fourth international conference on computer and information technology (CIT ’04), Washington, DC, USA, pp 528–533 Jiang T, Li Q, Ruan Y (2004) Secure dynamic source routing protocol. In: Proceedings of the fourth international conference on computer and information technology (CIT ’04), Washington, DC, USA, pp 528–533
14.
Zurück zum Zitat Johnson DB, Maltz DA, Broch J (2001) The dynamic source routing protocol for multihop wireless ad hoc networks. In: Ad hoc networking, pp 139–172 Johnson DB, Maltz DA, Broch J (2001) The dynamic source routing protocol for multihop wireless ad hoc networks. In: Ad hoc networking, pp 139–172
15.
Zurück zum Zitat Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw 1(2–3):293–315 CrossRef Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw 1(2–3):293–315 CrossRef
16.
Zurück zum Zitat Kargl F, Geis A, Schlott S, Weber M (2005) Secure dynamic source routing. In: Proceedings of the 38th annual Hawaii international conference on system sciences (HICSS ’05), Washington, DC, USA Kargl F, Geis A, Schlott S, Weber M (2005) Secure dynamic source routing. In: Proceedings of the 38th annual Hawaii international conference on system sciences (HICSS ’05), Washington, DC, USA
17.
Zurück zum Zitat Kim J, Tsudik G (2009) SRDP: secure route discovery for dynamic source routing in MANETs. Ad Hoc Netw 7(6):1097–1109 CrossRef Kim J, Tsudik G (2009) SRDP: secure route discovery for dynamic source routing in MANETs. Ad Hoc Netw 7(6):1097–1109 CrossRef
18.
Zurück zum Zitat Kong J, Hong XY (2003) ANODR anonymous on demand routing with untraceable routes for mobile ad-hoc networks. In: Proceedings of the 4th ACM international symposium on mobile ad hoc networking & computing (MobiHoc ’03), 14–19 September 2003. ACM, New York, pp 291–302 CrossRef Kong J, Hong XY (2003) ANODR anonymous on demand routing with untraceable routes for mobile ad-hoc networks. In: Proceedings of the 4th ACM international symposium on mobile ad hoc networking & computing (MobiHoc ’03), 14–19 September 2003. ACM, New York, pp 291–302 CrossRef
19.
Zurück zum Zitat Mavropodi R, Kotzanikolaou P, Douligeris C (2007) SecMR—a secure multipath routing protocol for ad hoc networks. Ad Hoc Netw 5(1):87–99 CrossRef Mavropodi R, Kotzanikolaou P, Douligeris C (2007) SecMR—a secure multipath routing protocol for ad hoc networks. Ad Hoc Netw 5(1):87–99 CrossRef
20.
Zurück zum Zitat Song R, Korba L, Yee G (2005) AnonDSR: efficient anonymous dynamic source routing for mobile ad-hoc networks. In: Proceedings of the 3rd ACM workshop on security of ad hoc and sensor networks (SASN ’05), New York, NY, USA, pp 33–42 CrossRef Song R, Korba L, Yee G (2005) AnonDSR: efficient anonymous dynamic source routing for mobile ad-hoc networks. In: Proceedings of the 3rd ACM workshop on security of ad hoc and sensor networks (SASN ’05), New York, NY, USA, pp 33–42 CrossRef
21.
Zurück zum Zitat Su MY (2010) WARP: a wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks. Comput Secur 29(2):208–224 CrossRef Su MY (2010) WARP: a wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks. Comput Secur 29(2):208–224 CrossRef
22.
Zurück zum Zitat Perkins C, Belding-Royer E, Das S Ad hoc on-demand distance vector (AODV) routing. IETF. RFC 3561. Retrieved 2010-06-18 Perkins C, Belding-Royer E, Das S Ad hoc on-demand distance vector (AODV) routing. IETF. RFC 3561. Retrieved 2010-06-18
23.
Zurück zum Zitat Paik JH, Kim BH, Lee DH (2008) A3RP: anonymous and authenticated ad hoc routing protocol. In: International conference on information security and assurance, 24–26 April 2008, pp 67–72 Paik JH, Kim BH, Lee DH (2008) A3RP: anonymous and authenticated ad hoc routing protocol. In: International conference on information security and assurance, 24–26 April 2008, pp 67–72
24.
Zurück zum Zitat Tseng FH, Chou LD, Chao HC (2011) A survey of black hole attacks in wireless mobile ad hoc networks. Hum-Centr Comput Inf Sci 1(1):4 CrossRef Tseng FH, Chou LD, Chao HC (2011) A survey of black hole attacks in wireless mobile ad hoc networks. Hum-Centr Comput Inf Sci 1(1):4 CrossRef
Metadaten
Titel
An anonymous distributed routing protocol in mobile ad-hoc networks
verfasst von
Ren-Junn Hwang
Yu-Kai Hsiao
Publikationsdatum
01.11.2013
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 2/2013
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-013-0920-0

Weitere Artikel der Ausgabe 2/2013

The Journal of Supercomputing 2/2013 Zur Ausgabe