Anonymous and Authenticated Routing in Multi-hop Cellular Networks

Size: px
Start display at page:

Download "Anonymous and Authenticated Routing in Multi-hop Cellular Networks"

Transcription

1 Anonymous and Authenticated Routing in Multi-hop Cellular Networks Mohamed Elsalih Mahmoud and Xuemin (Sherman) Shen Department of Electrical and Computer Engineering University of Waterloo, Waterloo, Ontario, Canada, N2L 3G1 Abstract Multi-hop cellular network is a promising architecture aiming to improve the performance of current cellular network. However, there are many security challenges due to the participation of the mobile nodes in the routing process. In this paper, we address two challenges: route anonymity, aiming to prevent attackers from tracking a packet flow to its source or destination; and location privacy, aiming to prevent attackers from detecting the nodes locations. Most of the existing solutions require much computational power and energy. We propose a routing protocol that provides anonymous communication by protecting the user s anonymity and location privacy. The user's anonymity is preserved for a large number of compromised nodes. Simulations results show that the proposed protocol is efficient and can be implemented with an acceptable overhead. Index Terms Anonymous Routing, Privacy, Security, Multihop Cellular Networks. I. INTRODUCTION Multi-hop cellular network (MCN) is a network architecture [1-4], which incorporates the characteristic of the ad hoc and cellular networks, as shown in Fig. (1). Unlike current single hop cellular network, packets are relayed hop by hop from an originator to a destination through the intermediate nodes and base stations (BS), where each mobile node is a potential router that forwards data packets to other peer nodes. The network has a centralized trusted party (TP) to generate the keys to the network entities. Figure (1): Multi-hop cellular network architecture There are many benefits from MCN [5-8]. The power consumption of the mobile devices can be reduced because the signal transmission distances are shorter. The interference between the nodes can be reduced. Since the coverage area of the base station increases, the capacity of the cells can be increased. However, the network suffers from security challenges due to the participation of the mobile devices in the routing process, including the user s privacy violation. Adversaries can trace the network routes and infer the source and destination causing threats against the user s privacy. Attackers can infer the user s location in number of hops, and colluders distributed in different locations can track users. In this paper, we propose a routing protocol that protects the users anonymity and considers the network characteristics such as limited resources and scalability. Our protocol uses dynamic identities to enable the mobile nodes to send their packets anonymously without identifying the sender and receiver, and to authenticate themselves without revealing their real identities. The dynamic identities can be pre-computed, which improves the end to end delay. The proposed protocol uses lightweight cryptographic tools and does not assume a long-term secret key shared between each two nodes. In addition, to establish a route, the protocol requires one broadcast packet with light computation because it is flooded to a large number of nodes. The remainder of the paper is organized as follows. We discuss some related work in section II. The adversary and trust models are shown in section III. In section IV, a new authenticated and anonymous on demand routing protocol is introduced. Performance and anonymity analyses are given in sections V and VI, followed by the conclusion in section VII. II. RELATED WORK The protocols in this section were chosen because they use different techniques, and are adopted by many anonymous routing protocols for MCN. In [9], an anonymous routing protocol called ANODR is proposed. The protocol assumes that each two nodes pre-share a long term key. In route request packet (RREQ), nodes do not know which key is going to be used to open the trapdoor because the identities of the source and destination are hidden for anonymity, so they have to try all the keys. The route establishment phase suffers from high delay due to using public key cryptography and executing much computation. The protocol also suffers from an anonymity problem, i.e., legitimate (or eavesdropping) separate nodes along the route can trace the data packets because their contents do not change from node to node. A cryptographic onion for the data packets can not be made to fix this problem, because the source and destination do not exchange session keys with the intermediate nodes. Therefore, if the attacker eavesdrops on both the sender and receiver, he can know that they are communicating. In addition, each node /09/$ IEEE

2 uses one temporary identity for the whole session, so the attacker can violate the user s privacy during the session, if he could link the real identity to the temporary one. In [10], an anonymous routing protocol called SDAR is proposed. To know that it is the destination, each node tries to open a trapdoor with its private key, which requires much computational power. The expected delay of the route establishment is large since each node performs much computation. The sizes of RREQ and route reply packets (RREP) are large, which requires more energy and bandwidth. The protocol violates the privacy of the network nodes because the destination learns the identities of all the forwarding nodes en route. The location of the destination is also disclosed to the source. In [11], a routing protocol is presented to preserve the communication privacy. The protocol is based on frequently changing the node s pseudonyms and cryptographic keys. The protocol suffers from many limitations. First, loading each node with a set of public/private keys and certificates requires a large storage space that may not be available at limited resources nodes. Second, the keys can also be misused in Sybil attack [12]. Third, key revocation is very difficult due to using a large number of keys in the network. In addition, periodically refilling the keys is much overhead on the network. The nodes also need to re-authenticate themselves periodically and exchange symmetric keys with their neighbors. An anonymity problem is that the distances from the anonymous neighbors to the base station are known. An attacker can use this information to guess the identity of the neighbor. The used pseudonyms generation technique is not efficient or secure. To link pseudonyms with each other, the base station and nodes need to calculate the pseudonyms for all the nodes. The pseudonyms require online generation because they can not be pre-computed, which leads to increasing in the end-end delay. III. PRELIMINARY A. Design Challenges and Goals Location privacy is defined as the ability to prevent other parties from learning one s current and past locations [13], and anonymity is defined as the state of being not identifiable within a set of subjects called the anonymity set [14]. There are several challenges to design protocol that enables the users anonymous and location private communication. One challenge is to achieve identity anonymity which is the property that a packet is not linkable to the real identities of the source, destination and intermediate nodes. Identity anonymity can be achieved by using dynamic identities which are not linkable to the real ones or to each other. Identity anonymity protects the network from traffic analysis attacks. Another challenge is to achieve location anonymity. The location of a node is compromised, if an attacker can infer the distance in terms of number of hops or exact physical location. The protocol should prevent an attacker from inferring the distance to the anonymous source or destination to deprive him from guessing their identities. The source and destination know the identities of each others but not their locations. In order to route the messages, the base stations need to know the real identities and locations of the source and destination. In route anonymity, the protocol should prevent an attacker from inferring the participating nodes in one session. In other words, the transmitted packets from the nodes should not show that they belong to one session, since any unchanged part in the forwarded packets of a session can easily expose the anonymous path. For authenticated routing, before forwarding the packets, the intermediate nodes should be able to ensure that they serve legitimate users. The main challenge in designing the protocol is to consider the network characteristics, especially the nodes limited resources, scalability and distribution in large geographic area. B. Adversary and Trust Model Without loss of generality, we assume the adversary knows all the network protocols and functions but does not know the secret keys. An attacker can eavesdrop to the transmission in its rage, and it can record and re-send the intercepted packets. Attackers can be legitimate users or eavesdroppers. They also can be single nodes or several nodes colluding with each other under one central attacker, but they can not be global attackers or colluding with large number of nodes due to the scalability of the network. The attacker aims to know who is communicating and to whom, and to launch traffic analysis to monitor the traffic activity between the communicating parties. An attacker tries to reveal the identities of the nodes and their locations in number of hops. Colluders may cooperate to infer the anonymous route and thus to detect the communicating parties. Attackers do not aim to disrupt the routing or to launch denial of service attack. They avoid any attack that reveals their actions since they attempt to be invisible. For the trust model, the nodes do not trust each other with their identities and locations or to correctly execute the network functions and protocols. However, they trust the base stations with their identifiers and locations but not with their long term keys because they may belong to foreign networks. C. Notations The used notations in this paper are given in table (1). Symbol Description Shared between Lifetime K i Shared key Node i and TP A long term ID i Unique identity Node i and TP A long term K T (BS) Shared key TP and BS A long term K i (BS) Shared key Node i and BS One authentication ID i (BS) Dynamic identity Node i and BS One message K i (j) Shared key Node i and j One session ID i (j) Dynamic identity Node i and j One message Table (1): Description for the used keys and identities IV. THE PROPOSED PROTOCOL A. Dynamic Identities A node protects its anonymity by using dynamic identities and periodically changing them in such a way that just an intended node can link them to each other or to the real identity. If two nodes (X and Y) share a secret key (K), they

3 can start a series of dynamic identities by keyed hashing to the last used identity, where the first identity is a keyed hash of a public seed value. In order to keep the synchronization between the communicating parties, the identities are used in forward direction. The identities are not linkable to the real identity or to each other without knowing the secret key. Therefore, the identities are authenticated because no one can generate them except the owner of the secret key. They have high anonymity protection level because each identity is used only for one packet. They can not be linked to the real identity or to each other. Low computational power is required because only hash function is used. The additional end to end delay and the storage space are low because they can be precomputed. Resynchronization is easy. For instance, if the expected identity is number (10) but due to nonsynchronization, the identity number (13) is received; in this case the node does not lose synchronization because it compares the received identity with a window of expected ones. After finding identity (13), the window is shifted. The size of the dynamic identity can be reduced by truncating the output of the keyed hash function. Figure (2): Route Establishment Phase B. Proposed Protocol The proposed protocol consists of three phases: in authentication phase, a mobile node authenticates itself to the trusted party to get a membership symmetric key shared with a base station. As shown in Fig. (2), in route establishment phase, a route is established to the destination node, and the base station distributes the session keys for the nodes on the route. The keys are used to start a series of dynamic identities that are used to identify the session and to enable the nodes to authenticate each other. Finally, in the data transfer phase, an onion encryption technique is used to prevent attackers from correlating the relayed messages. B.1 Authentication Phase As shown in Fig. (3), node (i) initiates the authentication process by sending an authentication request packet (AREQ) with the latest dynamic identity shared with the trusted party. With this packet, the node authenticates itself to the trusted party because none can generate it except the owner of the shared key (K i ). The trusted party checks whether the identity is for a registered user. It replies with the node s real identity, the membership key (K i (BS)) shared between the base station and node (i), and a new shared identity ID i (TP). After executing this phase, the node and the base station authenticate each other without revealing the node s secret key. They also share a secret key used in communication and in generating the node s dynamic identities where the seed value is ID i (TP). 1) i BS: <AREQ, ID i (TP), E Ki (ID i (TP),ID i )> 2) BS TP: < AREQ, ID i (TP), E Ki (ID i (TP),ID i )> 3)TP BS:<AREP,ID i (TP),E KT(Bs) [ID i,k i (BS),E Ki (ID i (TP),K i (BS))] > Figure (3) Authentication phase B.2 Route Establishment Phase When a node wants to initiate a communication, a route to the destination node should be established and each two neighbors in the route need to share a secret key. 1) Uplink Route Establishment RREQ Phase As shown in Fig. (4), the communicating source node initiates the session by broadcasting a RREQ packet which contains the latest dynamic identity shared with the base station. With this identity and the encrypted part with E KS(BSs), the node authenticates itself to the base station. In order to bound the propagation area of the request, TTL (time to live) is used. Each intermediate node decrements it, and when it reaches zero the request is no longer forwarded. Moreover, a padding (PD) is added. The length of the padding (PL) and the real identity of the destination node are encrypted. As shown in the figure, each intermediate node adds its dynamic identity and broadcasts the request locally to its neighbors. It also stores in the routing table the dynamic identities for the source node and itself. If it receives a route reply packet with its next dynamic identity, it means that it is chosen a member in the session route. In order to avoid loops in the routes or degrading the network performance, the intermediate nodes discard any further packets with the same request. As the request packet moves towards the base station, it stores the identifiers of the nodes on the route, so when the base station receives the request packet, it determines what nodes were on the route, and then it composes and sends a RREP packet. In order to protect the location anonymity of the source node and to confuse attackers whether the packet is originated or forwarded from the previous node, the values of the padding and the TTL are randomly chosen. We use the techniques in [15] to select the random values of padding and TTL. S *: <RREQ,ID S (BS s ), TTL,E KS(BSs) (PL,ID d,id S (BS s )), PD> A *:<RREQ,ID S (BS s ),TTL-1,E KS(Bss) (PL,ID d,id S (BS s )),PD, ID A (BS s )> B *:<RREQ,ID S (BS s ),TTL-2,E KS(BSs) (PL,ID d,id S (BS s )),PD, ID A (BS s ),ID B (BS s )> BS s : <RREQ,ID S (BS s ), TTL-2, E KS(BSs) (PL,ID d,id S (BS s )),PD, ID A (BS s ),ID B (BS s )> Figure (4): RREQ in the uplink route establishment RREP Phase As shown in Fig. (5), the RREP packet contains one part for

4 each node participating in the session route. Each part contains the latest dynamic identity, and the session key shared with the previous node in the route. The node hashes this key to derive the shared key with the next node. For instance, node A uses K A (B) to communicate with node B, and K A (S)= H KA(BSs) (K A (B)) to communicate with B. By this way, the number of transmitted keys is nearly halved. Padding is added to the part related to the source to protect its location anonymity. After receiving the RREP packet, each intermediate node checks whether it is on the route. Then, it broadcasts the packet after taking off its part. Finally, the base station sends a call request to the destination base station. BS s B: < RREP, ID B (BS s ),E KB(BSs) [ID B (BS s ),K B (BS s )], ID A (BS s ),E KA(BSs) [ID A (BS s ),K A (B)], ID S (BS s ),E KS(BSs) [ID S (BS s ),K S (A), PD]> B A < RREP, A S: < RREP, Figure (5): RREP in the uplink route establishment 2) Downlink Route Establishment ID A (BS s ),E KA(BSs) [ID A (BS s ),K A (B)], ID S (BS s ),E KS(BSs) [ID S (BS s ),K S (A), PD]> ID S (BS s ),E KS(BSs) [ID S (BS s ),K S (A), PD]> After a base station receives a call request, it establishes a route to the destination node by broadcasting a RREQ packet. The destination node replies with RREP with the identities of session nodes. Finally, the base station distributes the keys. RREQ Phase As shown in Fig. (6), the base station broadcasts a RREQ packet containing a new dynamic identity to the destination node and the encryption to both the fresh dynamic identity of the destination node and the real identity of the calling node. After receiving the request, each node adds its identity and rebroadcasts the packet, if it is not the destination and TTL is greater than zero. Each node stores the routing information which contains the dynamic identities for both the previous node and itself. The destination node sends a RREP packet and re-broadcasts the packet after adding its identity to deprive attackers from inferring the destination of the packet. after changing the identity of the next hop. D Y: < RREP, ID Y (BS d ),E KD(BSd) [PL, ID Y (BS d ), ID X (BS d ), PD]> Y X: < RREP, ID X (BS d ), E KD(BSd) [PL, ID Y (BS d ),ID X (BS d ), PD]> X BS d : < RREP, BS d, E KD(BSd) [PL, ID Y (BS d ), ID X (BS d ), PD]> Figure (7): RREP in the downlink route establishment Session Keys Distribution After the base station receives the RREP packet, it knows the identities of the nodes participating in the route. In order to distribute the session keys, it sends the same packet as RREP packet in the uplink route establishment shown in Fig. (5) Uplink S A: < DATA, ID S (A), E KS(BSs) (M, H(M))> A B: < DATA, ID A (B), E KA(BSs) (E KS(BSs) (M, H(M)))> B BS s : <DATA,ID B (C), E KB(BSs) (E KA(BSs) (E KS(BSs) (M, H(M))))> Downlink BS d X: < DATA, ID BSd (X), E KX(BSd) (E KY(BSd) (E KD(BSd) (M,H(M))))> X Y: < DATA, ID X (Y), E KY(BSd) (E KD(BSd) (M,H(M)))> Y D: < DATA, ID Y (D), E KD(BSd) (M, H(M)) > B.3 Data Transfer Phase Figure (8): Data Transfer Phase Onion routing is used to change the content of the message after each hop. As shown in Fig.(8), the source node composes the data packet by encrypting the message and its hash with the shared key with the base station. Then, the node transmits the packet to the next node after adding the shared dynamic identity. Each intermediate node re-encrypts the message with the shared key with the base station and changes the next hop identity. The source base station removes the encryption layers from the packet and sends the message to the destination base station, which encrypts the message with the keys shared with the session nodes and transmits it. Each intermediate node removes one encryption layer and forwards the packet. BS d *: < RREQ, TTL, ID D (BS d ), E KD(BSd) (ID D (BS d ),ID s )> X *: < RREQ, TTL-1, ID D (BS d ), E KD(BSd) (ID D (BS d ),ID s ), ID X (BS d )> Y *: < RREQ, TTL-2, ID D (BS d ), E KD(BSd) (ID D (BS d ),ID s ), ID X (BS d ), ID Y (BS d )> D *: < RREQ, TTL-3, ID D (BS d ), E KD(BSd) (ID D (BS d ),ID s ), ID X (BS d ), ID Y (BS d ), ID D (BS d )> Figure (6): RREQ in the downlink route establishment RREP Phase As shown in Fig. (7), the destination node composes the RREP packet and sends it to the first node in the route. The packet contains the identities of the nodes on the route and padding to protect the location anonymity of the destination node. The intended intermediate node re-transmits the packet V. SECURITY ANALYSIS For the proposed protocol, we have used dynamic identities to preserve the anonymity of the nodes real identities. The used dynamic identities can not be linked to each other without knowing a secret key, and they also can not be linked to the real identity. The used dynamic identities raise the anonymity protection level because they are used for one route and just one session. Each identity is used just for one packet. Therefore, even if attackers could link the identity to a node, they can not violate the node s privacy for a long time. The used dynamic identities achieve conditional anonymity because the base stations can link them to the real ones. For location anonymity, we have used padding and random valued TTL to hide the locations of the anonymous sender and receiver. Therefore, an adversary can not differentiate whether the packet is originated or forwarded from a node. To further

5 improve the location anonymity, each node does not know its anonymous neighbours except for the session time. Although long relations among a node and its neighbours may simplify the protocol, attackers can violate the node's privacy, if they could link the long term temporary identity to the real one. For route anonymity, attackers can not link the identities of the nodes participating in one session. In route establishment phase, a global attacker listening to all the nodes can not infer the chosen nodes in a session due to using fresh dynamic identities in the RREP packets. An attacker can not correlate the session data packets to one session because their contents change after each hop due to using onion encryption and decryption operations. In brief, session data packets do not expose the anonymous path because they completely change from node to node. Each node en route knows just two anonymous neighbours on the session route. If a node is compromised, the adversary can link two dynamic identities together for each route going through this node. If the compromised nodes are not consecutive, then the attacker can detect route segments. However, it is difficult to link them together. Therefore, in order to infer an anonymous route, the attacker has to compromise all the nodes in the route. Eq. (1) is the probability to compromise all the nodes in a route. In other words, it gives the probability to track a packet, assuming the probabilities to compromise a node and to participate in a session are uniform, where (n) is the number of nodes in the base station area, (nc) is the number of compromised nodes, and (x) is the number of nodes in one session. Pr ( nc! )(( n x )! ) = (1) (( nc x )! )( n! ) Figure (9): The probability of tracing packets For ANODR [9], separate malicious legitimate nodes or eavesdroppers can correlate the packets and infer the packet path. Compromising separate nodes is much more likely than compromising consecutive ones. Fig. (9) shows that the probability to trace an anonymous route in our protocol is much less than ANODR. For example, when the session nodes are four, even if an attacker could compromise 50% of the network nodes (which is very difficult in such scalable network), it can track less than 6% of the packets in our protocol and 25% in ANODR. Even if an attacker could compromise the anonymous route, the base station works as a mixer. It is difficult to link the input and output messages to each other. Therefore, severe attack may infer the anonymous route to the base station but not to the destination node. The proposed routing is authenticated in order to enable the network nodes to verify that the received packets come from registered nodes. It also ensures that the network infrastructure can track the actions of the nodes and their misbehaviors. Our protocol is secure against modification, replay, Sybil and traffic analysis attacks. Eavesdropper can not correlate the transmitted packets to a session. It can only know that a packet is transmitted from a certain group of nodes, but it can not know whether it is originated or relayed from the group. In addition, if a node is participating in more than one sessions, eavesdropper can not link the transmitted packets to their sessions. Every time the same source and destination nodes initiate a communication, they send completely different uplink and downlink route request packets. Therefore, even if an attacker eavesdrops on the source and destination, it can not know that they are communicating. The protocol uses ondemand routing which is more secure than source routing because it does not advertise the routes in advance. It just establishes the routes when needed. In authentication phase, a node does not reveal its long term secret key to the base station, that is extremely important when the base station belongs to a foreign network. In addition, although the protocol assumes that the base station knows the real identities of the nodes, it can be modified easily to hide them. However, more overhead is encountered in contacting the trusted party to convert the dynamic identity into real one. VI. PERFORMANCE ANALYSIS The protocol uses lightweight cryptographic tools which are more suitable for resource-limited devices. An efficient technique to generate the dynamic identities is used. It requires a small storage space and computational power. Reducing the computational overhead of the trapdoor and the broadcast packets has a significant positive impact on the protocol performance because they are received by a large number of nodes. Our solution requires one broadcast packet in route request phase and the computational load is just adding the pre-computed identities. In packet transfer phase, we have alleviated the load on the nodes by using onion routing in opposite order, where most of the loads are with the base stations. The number of session keys transmitted from the base station is nearly halved by allowing the nodes to derive the other half locally. In packet transfer phase, the overhead is one dynamic identity instead of the whole route identities. The same protocol without any modifications can be used in bidirectional communication. In order to evaluate the performance of the proposed protocol, we implement it using a laptop computer and a network simulator. The resources of the real mobile node may be less than a laptop but the results can be scaled to give estimation to the expected overhead. According to the recommended key sizes by NIST [16], we consider AES (128 bit key) as a secure symmetric key cryptosystem. We use a

6 well known hash function HMAC/MD5 (128 bits). Without knowing the secret key, the probability to generate a correct hash value is 2 (-128/2) =5.42e-20 by birthday paradox [17], which is negligible. First, we run an experiment to measure the computational overhead of the specified cryptographic tools. Our mobile node is a laptop: 1.6 GHZ Intel CPU, 1 GB Ram and Windows XP operating system. Crypto++5 libraries [18] are used for the cryptographic tools. The resultant computational times are 0.256μs/16bytes for encryption and decryption and 0.272μs/16 bytes for HMAC/MD5, respectively. To measure the expected number of intermediate nodes in one session, we used Matlab to simulate a network size as 500m by 500m and two network densities with 100 and 50 nodes. The coverage area of the base stations and nodes are 150 and 75m, respectively. The results show that the average numbers of intermediate nodes are and at the low and high densities, respectively. Network density High Low Route establishment computational time(μs) Average end-end computational time (μs) Data packets overhead (Bytes) 16 Route establishment Overhead Av. RREQ at the BS (Bytes) Max. broadcast RREQ (TTL=10) 240 Bytes Av. RREP at the BS (Bytes) Av. RREQ at the Destination (Bytes) Max. broadcast RREQ (TTL=10) 224 Bytes Av. RREP at the BS (Bytes) Key distribution As RREP in uplink Table (2): Performance evaluation Uplink Downlink Table (2) summarizes the performance results of the proposed model, which indicates that the expected end to end computational time is acceptable due to using lightweight cryptographic tools and pre-computing dynamic identities. For the uplink RREQ, the measurement is for the maximum packet size at the base station. Each node reduces the packet by 16 bytes. RREP packet is unicast, it is reduced by 48 bytes at each node. The overhead of data packets is just one dynamic identity with 16 bytes. The overhead of the data packets is more effective than that of route establishment because they are sent more frequently. The table shows that the effect of the network density is negligible, and the overall cost of using the protocol is acceptable. VII. CONCLUSION In this paper, we have proposed an anonymous and authenticated on-demand routing protocol for MCNs. The proposed protocol is based on frequently changing lightweight, pre-computed and authenticated dynamic identities to the nodes. The protocol has high anonymity protection level, and it is secure against many attacks. The performance evaluation shows that the overhead is acceptable. In our future work, we will propose a routing protocol for pure ad hoc mode. In addition, we will do more simulations to measure the network performance metrics such as the end to end delay and the throughout. REFERENCES [1] Y.-D. Lin and Y.-C. Hsu, Multihop Cellular: A New Architecture for Wireless Communications. In Proceedings of the 19th Annual Joint Conference of the IEEE Computer and Communications Societies,2000. [2] X. J. Li, B.-C. Seet, P. H. J. Chong, "Multihop cellular networks: Technology and economics", Computer Networks 52 (2008) , [3] N. V. Marathe, U. B. Desai, S. N. Merchant, "Base Station Selection Strategy in Multihop Cellular Networks: A New Approach" IEEE- International Conference on Signal processing, Communications and Networking, pp , Jan 4-6, [4] S. Bah, R. Glitho, R. Dssouli, "SIP Servlets for Service Provisioning in Multihop Cellular Networks: High-Level Architectural Alternatives", IEEE Communications Society, in proceedings of the IEEE CCNC, Pages , [5] M. Kubisch, S. Mengesha, D. Hollos, H. Karl, and A. Wolisz, Applying ad-hoc relaying to improve capacity, energy efficiency, and immission in infrastructure-based WLANs. In Proceedings of Kommunikation in Verteilten Systemen, Leipzig, Germany, [6] R. Schoenen, R. Halfmann, and B. H. Walke, "MAC Performance of a 3GPP-LTE Multihop Cellular Network". In proceeding of IEEE Communications Society, pages , ICC [7] F. Hossain, H. Chowdhury "Impact of Mobile Relays on Throughput and Delays in Multihop Cellular Network". In proceeding of the Fourth International Conference on Wireless and Mobile Communications, IEE computer society, pages , ICWMC [8] R. Schoenen, R. Halfmann and B. Walke, An FDD Multihop Cellular Network for 3GPP-LTE, in Proceedings of the VTC Spring Conference, Singapore, May [9] J. Kong and X. Hong, ANODR: Anonymous on Demand Routing with Untraceable Routes for Mobile Ad-Hoc Networks. In Proceedings of the 4th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'03), pp , 2003 [10] A. Boukerche, K. El-Khatib, L. Xu, and L. Korba, SDAR: A Secure Distributed Anonymous Routing Protocol for Wireless and Mobile Ad Hoc Networks. In Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks, pages , [11] S. Capkun, J. Hubaux, and M. Jakobsson, Secure and Privacy Preserving Communication in Hybrid Ad Hoc Networks. Technical Report IC/2004/104, EPFL-DI-ICA, Jan [12] J. Douceur, The Sybil Attack. In Proceedings of First IPTPS, [13] A. R. Beresford and F. Stajano, Location Privacy in Pervasive Computing, IEEE Pervasive Computing, vol. 2(1): pp , [14] A. Pfitzmann and M. Kohntopp, Anonymity, unobservability and pseudonymity - a proposal for terminology. In Designing Privacy Enhancing Technologies: Proceedings of the International Workshop on the Design Issues in Anonymity and Observability, LNCS [15] S. Seys, B. Preneel, ARM: anonymous routing protocol for mobile ad hoc networks, Proceedings of the 20th IEEE International Conference on Advanced Information Networking and Applications Workshops (AINA 2006 Workshops). [16] National Institute of Standards and Technology (NIST), Special Publication , Recommendation for Key Management - Part 1: General (Revised), 142 pages, March [17] A. J. Menezes, P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography. CRC Press, [18] W. Dai, Crypto Benchmarks, cryptopp.com/ benchmarks.html, 2008.

Strongly Anonymous Communications in Mobile Ad Hoc Networks

Strongly Anonymous Communications in Mobile Ad Hoc Networks Strongly Anonymous Communications in Mobile Ad Hoc Networks Y.Dong 1, V.O.K.Li 1, S.M.Yiu 2 and C.K.Hui 2 Dept. of Electrical and Electronic Engineering, the University of Hong Kong 1 Dept. of Computer

More information

Privacy Protection over Network Communication in Manet

Privacy Protection over Network Communication in Manet Privacy Protection over Network Communication in Manet 1 Dr.K.Rajangam., Head of EEE Department, SCAD Institute of Technology 2 Ms.L.Dhanam, Assistant Professor Department of Computer Science & Engineering,

More information

Anonymous Routing in Ad-hoc Networks

Anonymous Routing in Ad-hoc Networks Mercedes Rodríguez-García (mrodriguezgarci@uoc.edu) Helena Rifà-Pous (hrifa@uoc.edu) Universitat Oberta de Catalunya Working Paper Working Paper Series WP00-000 Research group: K-ryptography and Information

More information

Secure Key Sharing in Mobile Ad hoc Network using Content Invisibility Scheme

Secure Key Sharing in Mobile Ad hoc Network using Content Invisibility Scheme Secure Key Sharing in Mobile Ad hoc Network using Content Invisibility Scheme A. JEGATHEESAN Assistant Professor, Department of Information Technology Cape Institute of Technology, Levengipuram, Tamilnadu

More information

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:

More information

Wireless Network Security Spring 2014

Wireless Network Security Spring 2014 Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #16 Network Privacy & Anonymity 2014 Patrick Tague 1 Network Privacy Issues Network layer interactions in wireless networks often expose

More information

Packet Estimation with CBDS Approach to secure MANET

Packet Estimation with CBDS Approach to secure MANET Packet Estimation with CBDS Approach to secure MANET Mr. Virendra P. Patil 1 and Mr. Rajendra V. Patil 2 1 PG Student, SSVPS COE, Dhule, Maharashtra, India 2 Assistance Professor, SSVPS COE, Dhule, Maharashtra,

More information

Security Analysis of Two Anonymous Authentication Protocols for Distributed Wireless Networks

Security Analysis of Two Anonymous Authentication Protocols for Distributed Wireless Networks An abridged version of this paper appears in the Proc. of the Third IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom 2005 Workshops), 8-12 March 2005, Kauai Island,

More information

GPSIH: A Generic IP-Based Scheme For Identity Hiding In MANETs.

GPSIH: A Generic IP-Based Scheme For Identity Hiding In MANETs. GPSIH: A Generic IP-Based Scheme For Identity Hiding In MANETs. Yomna M.Mohsen, Mohamed Hamdy and Mohamed Hashem Computer Systems Department Information Systems Department Ain Shams University Cairo, Egypt

More information

Pseudonym Based Security Architecture for Wireless Mesh Network

Pseudonym Based Security Architecture for Wireless Mesh Network IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 4, Ver. VII (Jul Aug. 2014), PP 01-05 Pseudonym Based Security Architecture for Wireless Mesh Network

More information

Wireless Network Security Spring 2013

Wireless Network Security Spring 2013 Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #19 Location Privacy & Tracking Agenda Location privacy and tracking Implications / risks of location information Location privacy and anonymity

More information

SMART: A Secure Multipath Anonymous Routing Technique

SMART: A Secure Multipath Anonymous Routing Technique SMART: A Secure Multipath Anonymous Routing Technique Prateek Jain & Rupsha Bagchi Manipal Institute of Technology, Manipal University, Manipal, 576104, Karnataka, India E-mail : jainprateek_90@yahoo.com

More information

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM R.Bhuvaneswari 1, V.Vijayalakshmi 2 1 M.Phil., Scholar, Bharathiyar Arts And Science College For Women, India 2 HOD

More information

A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks

A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks BHARAT.VEERLA *1, and SREERAMA MURTHY #2 * Student, Dept of CSE, Sree Vahini Institute of Science and

More information

SECURE ROUTING PROTOCOLS IN AD HOC NETWORKS

SECURE ROUTING PROTOCOLS IN AD HOC NETWORKS SECURE ROUTING PROTOCOLS IN AD HOC NETWORKS INTRODUCTION 1. With the advancement in radio technologies like Bluetooth, IEEE 802.11or Hiperlan, a new concept of networking has emerged, known as ad hoc networks,

More information

Use of Symmetric And Asymmetric Cryptography in False Report Filtering in Sensor Networks

Use of Symmetric And Asymmetric Cryptography in False Report Filtering in Sensor Networks Use of Symmetric And Asymmetric Cryptography in False Report Filtering in Sensor Networks Aleksi Toivonen Helsinki University of Technology Aleksi.Toivonen@tkk.fi Abstract Sensor networks are easily deployable

More information

A Cloud-Based Scheme for Protecting Source-Location Privacy against Hotspot-Locating Attack in Wireless Sensor Networks

A Cloud-Based Scheme for Protecting Source-Location Privacy against Hotspot-Locating Attack in Wireless Sensor Networks A Cloud-Based Scheme for Protecting Source-Location Privacy against Hotspot-Locating Attack in Wireless Sensor Networks Mohamed M. E. A. Mahmoud and Xuemin (Sherman) Shen Department of Electrical and Computer

More information

Achieving Privacy in Mesh Networks

Achieving Privacy in Mesh Networks Achieving Privacy in Mesh Networks Xiaoxin Wu Intel China Research Center Ltd Beijing, China xiaoxin.wu@intel.com Ninghui Li Department of Computer Science Purdue University West Lafayette, IN 47907-2086,

More information

International Journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online

International Journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online RESEARCH ARTICLE ISSN: 2321-7758 DESIGN AND IMPLEMENTATION OF ADVANCED SECURE INTRUSION DETECTION SYSTEM FOR MANETS SAYYED MUSADDIQUE 1, S.S.HIPPARGI 2, ATTAR SHUAIB 3 1,2,3 Department of Electronics and

More information

Secure Routing and Transmission Protocols for Ad Hoc Networks

Secure Routing and Transmission Protocols for Ad Hoc Networks MobiHoc 2002 Working Session on Security in Ad Hoc Networks Secure Routing and Transmission Protocols for Ad Hoc Networks Zygmunt J. Haas and P. Papadimitratos (Panos) Cornell University Wireless Networks

More information

Trust-Based and Energy-Aware Incentive Routing Protocol for Multi-hop Wireless Networks

Trust-Based and Energy-Aware Incentive Routing Protocol for Multi-hop Wireless Networks Trust-Based and Energy-Aware Incentive Routing Protocol for Multi-hop Wireless Networks Mohamed Elsalih Mahmoud and Xuemin (Sherman) Shen Department of Electrical and Computer Engineering, University of

More information

Improving the Efficiency of Anonymous Routing for MANETs

Improving the Efficiency of Anonymous Routing for MANETs Improving the Efficiency of Anonymous Routing for MANETs Jiefeng (Terence) Chen a,b,, Roksana Boreli a,b, Vijay Sivaraman b a National ICT Australia (NICTA), Locked Bag 9013, Alexandria, NSW 1435, Australia

More information

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advance Research in Computer Science and Management Studies Volume 3, Issue 8, August 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

Wireless Network Security Spring 2013

Wireless Network Security Spring 2013 Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #11 Control-Plane Routing Misbehavior Agenda Control-Plane Routing Misbehavior MANET Routing Misbehavior at the control-plane Toward secure

More information

TARo: Trusted Anonymous Routing for MANETs

TARo: Trusted Anonymous Routing for MANETs TARo: Trusted Anonymous Routing for MANETs Jiefeng (Terence) Chen National ICT Australia Locked Bag 9013, Alexandria NSW 1435, Australia, and University of New South Wales, Australia, terence.chen@nicta.com.au

More information

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Lecture 13: Routing in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Routing in multihop networks Figure out a path from source to destination. Basic techniques of routing

More information

Routing Protocol Based Shared and Session Key Exchange Protocol for Wireless Mobile Ad-hoc Network

Routing Protocol Based Shared and Session Key Exchange Protocol for Wireless Mobile Ad-hoc Network Routing Protocol Based Shared and Session Key Exchange Protocol for Wireless Mobile Ad-hoc Network Md. Golam Kaosar Victoria University, Australia golam.kaosar@vu.edu.au Abstract Mobile Ad-hoc Network

More information

Sybil Attack Detection in Mobile Adhoc Network

Sybil Attack Detection in Mobile Adhoc Network Sybil Attack Detection in Mobile Adhoc Network 469 1 Yamini D. Malkhede, 2 Purnima Selokar 1 Department of CSE, G. H. Raisoni Institute of Engineering &Technology for Women, Nagpur, Maharashtra, India

More information

A Review on Black Hole Attack in MANET

A Review on Black Hole Attack in MANET A Review on Black Hole Attack in MANET Gourav Ahuja 1, Mrs. Sugandha 2 1 Department of Computer Science and Engineering, VCE, Rohtak, Haryana (India) 2 Asst. Prof., Department of Computer Science and Engineering,

More information

0x1A Great Papers in Computer Security

0x1A Great Papers in Computer Security CS 380S 0x1A Great Papers in Computer Security Vitaly Shmatikov http://www.cs.utexas.edu/~shmat/courses/cs380s/ Privacy on Public Networks Internet is designed as a public network Wi-Fi access points,

More information

Security Issues In Mobile Ad hoc Network Routing Protocols

Security Issues In Mobile Ad hoc Network Routing Protocols Abstraction Security Issues In Mobile Ad hoc Network Routing Protocols Philip Huynh phuynh@uccs.edu Mobile ad hoc network (MANET) is gaining importance with increasing number of applications. It can be

More information

A REVIEW PAPER ON DETECTION AND PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK

A REVIEW PAPER ON DETECTION AND PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK A REVIEW PAPER ON DETECTION AND PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK Parmar Amish 1, V.B. Vaghela 2 1 PG Scholar, Department of E&C, SPCE, Visnagar, Gujarat, (India) 2 Head of Department

More information

Reducing the Communication and Processing Overhead and Ensuring the Security in Multihop Wireless Networks - using RACE Mechanism

Reducing the Communication and Processing Overhead and Ensuring the Security in Multihop Wireless Networks - using RACE Mechanism International Journal of Modern Engineering Research (IJMER) www.ijmer.com Pp-87-91 ISSN: 2249-6645 Reducing the Communication and Processing Overhead and Ensuring the Security in Multihop Wireless Networks

More information

ANONYMOUS CONNECTIONS AND ONION ROUTING

ANONYMOUS CONNECTIONS AND ONION ROUTING I J C I T A E Serials Publications 6(1) 2012 : 31-37 ANONYMOUS CONNECTIONS AND ONION ROUTING NILESH MADHUKAR PATIL 1 AND CHELPA LINGAM 2 1 Lecturer, I. T. Dept., Rajiv Gandhi Institute of Technology, Mumbai

More information

Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks

Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks 1 S.Nandhini, 2 Mr.S.Franson Varun Richo, 1 PG Student, 2 Assistant professor, Francis Xavier Engineering college,

More information

AODV Routing Protocol in MANET based on Cryptographic Authentication Method

AODV Routing Protocol in MANET based on Cryptographic Authentication Method IJCSET October 2012 Vol 2, Issue 10, 1459-1464 www.ijcset.net ISSN:2231-0711 AODV Routing Protocol in MANET based on Cryptographic Authentication Method Thandu Naga Srinu Padma CSE,Sri Sunflower College

More information

Sybil Attack Detection and Prevention Using AODV in VANET

Sybil Attack Detection and Prevention Using AODV in VANET Sybil Attack Detection and Prevention Using in VANET Navneet 1, Rakesh Gill 2 1 M. Tech. Student, GITM, Bilaspur-Tauru Road, Gurgaon (Haryana) navneet_tehlan@yahoo.com 2 Asst. Prof., GITM, Bilaspur-Tauru

More information

A SIMPLE INTRODUCTION TO TOR

A SIMPLE INTRODUCTION TO TOR A SIMPLE INTRODUCTION TO TOR The Onion Router Fabrizio d'amore May 2015 Tor 2 Privacy on Public Networks Internet is designed as a public network Wi-Fi access points, network routers see all traffic that

More information

Context. Protocols for anonymity. Routing information can reveal who you are! Routing information can reveal who you are!

Context. Protocols for anonymity. Routing information can reveal who you are! Routing information can reveal who you are! Context Protocols for anonymity The nternet is a public network: Myrto Arapinis School of nformatics University of Edinburgh Routing information is public: P packet headers contain source and destination

More information

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, Nov-Dec 2010

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, Nov-Dec 2010 Network Security: Anonymity Tuomas Aura T-110.5240 Network security Aalto University, Nov-Dec 2010 Outline 1. Anonymity and privacy 2. High-latency anonymous routing 3. Low-latency anonymous routing Tor

More information

A Survey - Energy Efficient Routing Protocols in MANET

A Survey - Energy Efficient Routing Protocols in MANET , pp. 163-168 http://dx.doi.org/10.14257/ijfgcn.2016.9.5.16 A Survey - Energy Efficient Routing Protocols in MANET Jyoti Upadhyaya and Nitin Manjhi Department of Computer Science, RGPV University Shriram

More information

ComparisonofPacketDeliveryforblackholeattackinadhocnetwork. Comparison of Packet Delivery for Black Hole Attack in ad hoc Network

ComparisonofPacketDeliveryforblackholeattackinadhocnetwork. Comparison of Packet Delivery for Black Hole Attack in ad hoc Network Global Journal of researches in engineering Electrical and electronics engineering Volume 12 Issue 3 Version 1.0 March 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global

More information

A Theoretical Model for Location Privacy in Wireless Personal Area Networks

A Theoretical Model for Location Privacy in Wireless Personal Area Networks A Theoretical Model for Location Privacy in Wireless Personal Area Networks Dave Singelée 1, Ford-Long Wong 2, Bart Preneel 1, and Frank Stajano 2 1 ESAT SCD COSIC, Katholieke Universiteit Leuven IBBT,

More information

Authentication Part IV NOTE: Part IV includes all of Part III!

Authentication Part IV NOTE: Part IV includes all of Part III! Authentication Part IV NOTE: Part IV includes all of Part III! ECE 3894 Hardware-Oriented Security and Trust Spring 2018 Assoc. Prof. Vincent John Mooney III Georgia Institute of Technology NOTE: THE FOLLOWING

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, Nov-Dec 2012

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, Nov-Dec 2012 Network Security: Anonymity Tuomas Aura T-110.5241 Network security Aalto University, Nov-Dec 2012 Outline 1. Anonymity and privacy 2. High-latency anonymous routing 3. Low-latency anonymous routing Tor

More information

Implementation: Detection of Blackhole Mechanism on MANET

Implementation: Detection of Blackhole Mechanism on MANET Implementation: Detection of Blackhole Mechanism on MANET Mr. Vishwajith M V 1, Pratik Sanjel 2, Pranish Pokharel 3, Kshetiz Pokhrel 4 1 Assistant professor Information Science & Engineering Department,

More information

A Novel Secure Routing Protocol for MANETs

A Novel Secure Routing Protocol for MANETs 22 A Novel Secure Routing Protocol for MANETs Zhongwei Zhang University of Southern Queensland Australia 1. Introduction Ad hoc networks is a special kind of wireless network mode. A mobile ad hoc network

More information

Kun Sun, Peng Ning Cliff Wang An Liu, Yuzheng Zhou

Kun Sun, Peng Ning Cliff Wang An Liu, Yuzheng Zhou Kun Sun, Peng Ning Cliff Wang An Liu, Yuzheng Zhou Abstract Accurate and synchronized time is crucial in many sensor network applications Time synchronization becomes an attractive target due to its importance

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #11 Routing and Forwarding Security 2015 Patrick Tague 1 Class #11 Basics of routing in ad hoc networks Control-plane attacks and defenses Data-plane

More information

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol 1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol Vahid Zangeneh i and Shahriar Mohammadi ii * ABSTRACT In recent years, routing has been the most focused area in ad hoc networks

More information

Webpage: Volume 4, Issue VI, June 2016 ISSN

Webpage:  Volume 4, Issue VI, June 2016 ISSN SECURE DYNAMIC SOURCE ROUTING IN MOBILE ADHOC NETWORKS Pooja Sharma 1, Seep Sethi 2 1 M.Tech (ECE), 2 Head of ECE Department Somany (PG) Institute of Technology & Management, Rewari Abstract: A mobile

More information

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS 1 PRASHANTH JAYAKUMAR, 2 P.S.KHANAGOUDAR, 3 VINAY KAVERI 1,3 Department of CSE, GIT, Belgaum, 2 Assistant Professor, Dept.

More information

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks , pp.63-70 http://dx.doi.org/10.14257/ijast.2015.82.06 Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks Kulbir Kaur Waraich 1 and Barinderpal Singh

More information

Sybil Attack Detection with Reduced Bandwidth overhead in Urban Vehicular Networks

Sybil Attack Detection with Reduced Bandwidth overhead in Urban Vehicular Networks Sybil Attack Detection with Reduced Bandwidth overhead in Urban Vehicular Networks D.Balamahalakshmi Department of Computer Science and Engineering, V.S.B Engineering College, Karur, Tamilnadu, India 1

More information

Secure routing in ad hoc and sensor networks

Secure routing in ad hoc and sensor networks Security and Cooperation in Wireless Networks Secure routing in ad hoc and sensor networks routing in ad hoc networks; attacks on routing; countermeasures and secured routing protocols; routing security

More information

Security Enhancement of AODV Protocol for Mobile Ad hoc Network

Security Enhancement of AODV Protocol for Mobile Ad hoc Network Security Enhancement of AODV Protocol for Mobile Ad hoc Network Ms Darshana Patel 1, Ms Vandana Verma 2 1,2 RCEW, Jaipur, Rajasthan, India. ABSTRACT Here, authors presents a smart encryption algorithm

More information

CS526: Information security

CS526: Information security Cristina Nita-Rotaru CS526: Information security Anonymity systems. Based on slides by Chi Bun Chan 1: Terminology. Anonymity Anonymity (``without name ) means that a person is not identifiable within

More information

An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks

An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks December 1. 2006 Jong Oh Choi Department of Computer Science Yonsei University jochoi@emerald.yonsei.ac.kr Contents Motivation

More information

SHARP : Secured Hierarchical Anonymous Routing Protocol for MANETs

SHARP : Secured Hierarchical Anonymous Routing Protocol for MANETs SHARP : Secured Hierarchical Anonymous Routing Protocol for MANETs Remya S MTech, Network Engineering Department of Information Technology Rajagiri School of Engineering and Technology remya.sasidharanpillai@yahoo.com

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network

Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network 1 Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network Nilima Walde, Assistant Professor, Department of Information Technology, Army Institute of Technology, Pune, India Dhananjay

More information

2013, IJARCSSE All Rights Reserved Page 85

2013, IJARCSSE All Rights Reserved Page 85 Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Overview of

More information

Lecture 1 Applied Cryptography (Part 1)

Lecture 1 Applied Cryptography (Part 1) Lecture 1 Applied Cryptography (Part 1) Patrick P. C. Lee Tsinghua Summer Course 2010 1-1 Roadmap Introduction to Security Introduction to Cryptography Symmetric key cryptography Hash and message authentication

More information

A Secure Routing Protocol for Wireless Adhoc Network Creation

A Secure Routing Protocol for Wireless Adhoc Network Creation Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.88

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Instructor: Michael Fischer Lecture by Ewa Syta Lecture 25 April 18, 2012 CPSC 467b, Lecture 25 1/44 Anonymous Communication DISSENT- Accountable Anonymous

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS S. P. Manikandan 1, R. Manimegalai 2 and S. Kalimuthu 3 1 Department of Computer Science and Engineering, Sri Venkateshwara

More information

Survey on Traffic Pattern Discovery System For MANETs

Survey on Traffic Pattern Discovery System For MANETs Survey on Traffic Pattern Discovery System For MANETs Sanchali S. Pandhare 1 PG student, Department of Computer Science & engineering, Pankaj Laddhad Institute of Technology & Management Studies, Buldana.

More information

Enhanced Management of Certificate Caching and Revocation Lists in VANET

Enhanced Management of Certificate Caching and Revocation Lists in VANET Enhanced Management of Certificate Caching and Revocation Lists in VANET Sadiq H. Abdulhussain Computer Engineering Department College of Engineering University of Baghdad ABSTRACT Vehicular network security

More information

Wireless Network Security Spring 2011

Wireless Network Security Spring 2011 Wireless Network Security 14-814 Spring 2011 Patrick Tague Jan 18, 2011 Class #3 Wireless vulnerabilities and threats Announcement: Agenda 6 remaining survey slots, 12 students yet to sign up Vulnerabilities,

More information

Anonymous Routing in Wireless Networks: Onion Routing

Anonymous Routing in Wireless Networks: Onion Routing Wireless Networks - CSG 250 Term Project Report Anonymous Routing in Wireless Networks: Onion Routing Name: E-mail id: banerjee.p@neu.edu Abstract: Security and privacy are the major concerns while routing

More information

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing Algorithms Link- State algorithm Each node maintains a view of the whole network topology Find the shortest path

More information

Detection of Wormhole Attacks in Wireless Sensor Networks

Detection of Wormhole Attacks in Wireless Sensor Networks Detection of Wormhole Attacks in Wireless Sensor Networks Ms Shweta Dalke RGPV: Electronics & Communication,Truba College of Engineering & Technology,Indore,INDIA Ms Pallavi Pahadiya RGPV: Electronics

More information

Security and Anonymity

Security and Anonymity Security and Anonymity Distributed Systems need a network to send messages. Any message you send in a network can be looked at by any router or machine it goes through. Further if your machine is on the

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information

MEGHADOOT: A PACKET RADIO NETWORK ARCHITECTURE FOR RURAL COMMUNITIES

MEGHADOOT: A PACKET RADIO NETWORK ARCHITECTURE FOR RURAL COMMUNITIES MEGHADOOT: A PACKET RADIO NETWORK ARCHITECTURE FOR RURAL COMMUNITIES B. S. Manoj, K. R. Bharath Bhushan, S. S. Doshi, I. Karthigeyan, and C. Siva Ram Murthy High Performance Computing and Networking Laboratory

More information

Survey on Attacks in Routing Protocols In Mobile Ad-Hoc Network

Survey on Attacks in Routing Protocols In Mobile Ad-Hoc Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 12, December 2013,

More information

Security in Ad Hoc Networks Attacks

Security in Ad Hoc Networks Attacks Security in Ad Hoc Networks Attacks Nie Pin niepin(at)cc.hut.fi T-79.5401 Special Course in Mobility Management: Ad hoc networks 2007-3-28 NiePin/HUT/CS/TML 1 Agenda Objectives of attacks Target selection

More information

Mobile Security Fall 2011

Mobile Security Fall 2011 Mobile Security 14-829 Fall 2011 Patrick Tague Class #17 Location Security and Privacy HW #3 is due today Announcements Exam is in-class on Nov 9 Agenda Location security Location privacy Location, Location,

More information

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET) INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,

More information

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach ISSN (Print): 1694 0814 10 Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach Manoj Kumar Mishra 1, Binod Kumar Pattanayak 2, Alok Kumar Jagadev 3, Manojranjan Nayak 4 1 Dept.

More information

Prevention and Detection of Packet Dropping and Message Tampering Attack on MANET using EAMD

Prevention and Detection of Packet Dropping and Message Tampering Attack on MANET using EAMD Prevention and Detection of Packet Dropping and Message Tampering Attack on MANET using EAMD Miss. Priti G. Mesare PG. Student SGBAU, Amravati India Dr. S. S. Sherekar Assistant professor SGBAU, Amravati

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

Detection and Prevention Mechanism against Attack for MANET Routing Protocol

Detection and Prevention Mechanism against Attack for MANET Routing Protocol Detection and Prevention Mechanism against Attack for MANET Routing Protocol Miss A.P.Deshmukh Dr. V. M. Thakare Dr. S.S.Sherekar SGBAU, Amravati SGBAU, Amravati SGBAU, Amravati Maharashtra, India. Maharashtra,

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

A Technique for Improving Security in Mobile Ad-hoc Networks

A Technique for Improving Security in Mobile Ad-hoc Networks A Technique for Improving Security in Mobile Ad-hoc Networks By Ahmed Mahmoud Abdel Mo men A Master Thesis Submitted to the Faculty of Computers and Information Cairo University Information Technology

More information

Anonymous communications: Crowds and Tor

Anonymous communications: Crowds and Tor Anonymous communications: Crowds and Tor Basic concepts What do we want to hide? sender anonymity attacker cannot determine who the sender of a particular message is receiver anonymity attacker cannot

More information

International Journal of Advance Engineering and Research Development

International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 5.71 International Journal of Advance Engineering and Research Development Volume 5, Issue 03, March -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 BATCH

More information

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B. IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 04, 2015 ISSN (online): 2321-0613 Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol

More information

Simulation on Agent-based Onion Routing Network *

Simulation on Agent-based Onion Routing Network * National Research Council Canada Institute for Information Technology Conseil national de recherches Canada Institut de technologie de l'information Simulation on Agent-based Onion Routing Network * Song,

More information

International Journal of Advance Engineering and Research Development

International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 3.134 ISSN (Online): 2348-4470 ISSN (Print) : 2348-6406 International Journal of Advance Engineering and Research Development Volume 1, Issue 11, November -2014

More information

Design and Development of Anonymous Zone Based Partitioning and Routing Protocol in MANETS (AZPR)

Design and Development of Anonymous Zone Based Partitioning and Routing Protocol in MANETS (AZPR) Design and Development of Anonymous Zone Based Partitioning and Routing Protocol in MANETS (AZPR) Ayeesha Siddiqha 1, Arshad Khan 2 1 Assistant Professor, Malnad College of Engineering, Hassan, India 2

More information

An Unobservable Secure Routing Protocol against Wormhole and Black hole Attacks in MANET.

An Unobservable Secure Routing Protocol against Wormhole and Black hole Attacks in MANET. An Unobservable Secure Routing Protocol against Wormhole and Black hole Attacks in MANET. Annie Jesus Suganthi Rani.A and R.Mathan Abstract Mobile ad-hoc network (MANET) is a selfconfiguring infrastructure-less

More information

Secure Multi-Hop Infrastructure Access

Secure Multi-Hop Infrastructure Access Secure Multi-Hop Infrastructure Access presented by Reza Curtmola (joint work with B. Awerbuch, D. Holmer, C. Nita-Rotaru and H. Rubens) 600.647 Advanced Topics in Wireless Networks Wireless Infrastructure

More information

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (  1 RACE for Multihop Wireless Networks Suganya.S 1, Janani.S 2 1 PG Scholar, Department of Computer Science and Engineering, SreeSastha Institute of Engineering and Technology 2 Assistant Professor, Department

More information

Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks

Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Chang Su, Lili Zheng, Xiaohai Si, Fengjun Shang Institute of Computer Science & Technology Chongqing University of Posts and

More information

Keywords ALERT,anonymity protection,blackhole attacks,r-alert

Keywords ALERT,anonymity protection,blackhole attacks,r-alert Volume 4, Issue 8, August 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Reputation Based

More information

Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs

Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs Savithru Lokanath 1, Aravind Thayur 2 1 Department of Electronics & Communication Engineering, DayanandaSagar College of Engineering,

More information

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network Humayun Bakht Research Fellow, London School of Commerce, United Kingdom humayunbakht@yahoo.co.uk

More information