Anonymous Routing in Wireless Networks: Onion Routing

Size: px
Start display at page:

Download "Anonymous Routing in Wireless Networks: Onion Routing"

Transcription

1 Wireless Networks - CSG 250 Term Project Report Anonymous Routing in Wireless Networks: Onion Routing Name: id: banerjee.p@neu.edu

2 Abstract: Security and privacy are the major concerns while routing data through a wired or wireless network. Although encryption is used to protect data from being read by unintended recipients it still does not ensure complete safeness. The reason being that information can be gathered by an eavesdropper by indirect inferences like traffic analysis etc. In my literature survey project I have focused on the topic of anonymous routing onion routing in wired networks and extended it to wireless networks. In onion routing the data is wrapped in layers of encryption in a data structure called as an onion, which is then transmitted over the network. The onion is constructed in such a way that it prevents any eavesdropper from gaining information about the parties involved in the communication or the nature of their data exchange. Anonymous routing in wired networks cannot be directly mapped to wireless networks. This is because wireless networks are more vulnerable to privacy issues as compared to wired networks due to the mobility of nodes, limited battery power, and nature of message transmission. Hence it is more challenging to create anonymous routing protocols for a wireless scenario. 1 Introduction: The World Wide Web (WWW) is the most popular and widespread discovery of the millennium. Although it has been a few years since its inception, security is still a major concern over the web. Data that is transmitted over the network is subject to various threats ranging from privacy, confidentiality, integrity etc by an active or a passive attacker. An active attacker [3] not only snoops over the communication but also corrupts communication by injecting malicious data. To minimize the vulnerability of data during transmission encryption is used. A passive attacker [3] on the other hand simply eavesdrops and gathers information by observing the ongoing traffic. At times the mere fact that communication is being carried over a particular link or between two parties could be more valuable than the actual data that is being transmitted between them. Hence meta data can sometimes be more sensitive than the actual transmission data content. Meta data includes the sender and receiver identities, their location, length and time of the message etc [1]. Hence by analyzing such traffic data, indirect inferences can be made about the people communicating over a public network like their identities, their relationships etc. This is in line with evidence gathered by MIT reality mining project [2- Exploiting location Data]. 2 Traffic Analysis: 2.1 Overview: Traffic analysis [I, II] is the process of intercepting and examining messages in order to deduce information from the patterns in communication. It can be performed even when the messages are encrypted and cannot be decrypted. Thus an intruder can simply sniff packets and capture them. And analyzing the header content which has the source and destination address the intruder can gather valuable information about the ongoing communication. For example: an attacker can gain important information by monitoring, the frequency and timing of network packets. 2

3 2.2 Mechanism of traffic analysis [I, II]: Internet data packets have two parts: a data payload and a header used for routing. The data payload is the information being sent; e.g.: an message, a web page etc. The header consists of the source address, destination address, timing information, sizing information etc. Although the data payload is encrypted, traffic analysis still reveals a great deal about what a communicator is doing and, possibly, what they re saying. This is because it focuses on the header, which discloses the source, destination, size, timing, and other critical information. Thus encryption does not help against these attackers, since it only hides the content of internet traffic and not the headers. And it is not possible to encrypt the headers since the destination will not be able to identify the packet meant for it. Thus by analyzing the data headers and observing the packet movement trend an attacker can indirectly gather sensitive information about the communicating parties. A very simple form of traffic analysis might involve sitting somewhere between sender and recipient on the network, looking at headers. 2.3 Importance of Traffic analysis: Although traffic analysis provides lower quality information, it is preferred over cryptanalysis because it is easier than breaking complex encrypted messages [2]. It is also cheaper because traffic data can be automatically collected and processed to provide a high degree of intelligence [2]. It is used for military purposes [2] and by various organizations to track unpleasant events over the internet. 2.4 Resisting traffic analysis and need for anonymous routing [5]: As it can be seen traffic analysis can be used to extract a lot of sensitive information and it can strip a person of all his communication privacy over the internet. Hence it becomes important to take precautions against it and to increase the level of anonymity on the web. This is the main motivation for anonymous routing. Thus Onion routing, Chaums Mixes, Tor are a few methods that provide resilience towards traffic analysis. 3 Onion Routing : 3.1 Overview: Onion routing [VI] was conceived in 1996 by David.M.Goldschlag, Michael.G.Reed and Paul.F.Syverson for the Naval Research Laboratory s research group in high asurance system [6]. It lives just beneath the application layer and is designed to inteface with a wide variety of 3

4 unmodified internet services by means of proxies. Onion routing is the the mechanism in which the sender (initiator) and the receiver (responder) nodes communicate with each other anonymously by means of some anonymous intermediate nodes called as onion routers. It protects against traffic analysis and makes it very hard for an eavesdropper to determine who is talking to whom over the network. It concentrates on encrypting the packet header in such a way that only the intended destination understands that the packet is meant for him. Onion routing Instead of making a socket connection directly with the destination machine, the sender makes a connection to an onion proxy on a remote machine. This onion proxy then randomly selects a set of onion routers upto the destination and builds an anonymous connection to the destination via them. It then constructs a special data structure called as an onion and routes it through this established connection. Onion routing relies on public key cryptography.this enables the creation of an onion which is nothing but the transmission data wrappped in multiple layers of encryption with the route information in each layer of encryption. It is done in such a way that when the data moves from one onion router to the next, each onion router strips a layer of the onion using its private key to find its next hop, and routes the packet accordingly [5,6].This goes on till the packet reaches the receiver. Thus every onion router knows only its previous and next hop. Padding may be applied at each onion router to maintain the size of the onion. So data passed along this anonymous connection appears different to each onion router. Also since an onion is decrypted at each router there is no correspondence between an incoming and outgoing onion for a particular router. Hence data cannot be tracked en route and even a comprosmised onion router cannot be of much help. Even if an onion router is compromised only the previous and next hop would be visible but the actual sender and receiver would still be hidden.this provides added resistance to an attacker. 3.2 Infrastructure for Onion Routing [6] : Onion routing hardware can be subdivided into two parts: 4

5 Network infrastructure: As shown in the figure the network infrastructure consists of onion routers that carry traffic between the initiator and the responder (via the intermediate onion routers). Each onion router has a single connection to each of its neighbouring onion routers. The job of a onion router is to decrpyt an incoming packet using its private key and pass it to the next onion router mentioned in the onion packet. It may also apply padding to maintain the size of the onion thus making traffic analysis more difficult. Proxy interfaces: Onion Routing Network Infrastructure The proxy links the initiator to the anonymous connection (node W) on the initiator end and at the responder end it links the anonymous connection to the responder (node Z).eg:When the initiator sends a request for say a particular URL; instead of directly connecting to the server where the URL content is stored, it connects to an onion proxy W. This proxy then randomly chooses a set of onion routers say X-Y-Z. It then encrypts the packet with Y s, X s and Z s public key and their addresses and sends it to the first onion router on the desired root. The data then moves along the route and is transmitted by Z to the responder. Z also acts as a proxy because it passes data from the responder to the anonymous connection. Onion Routing Proxy Interface 5

6 Each onion proxy maintains a list of onion routers on the network and their IP addresses. There are also directory servers where active routers register with. So onion proxies can query directory servers from time to time in order to get an up-to-date list of servers on the network [5]. 3.3 Detailed Mechanism for Onion Routing: Onion routing consists of the following steps: Defining a route. Constructing an anonymous connection. Moving data through an anonymous connection. Destroying the anonymous connection. The following steps give a brief description of the above steps. When an onion proxy receives a message it first randomly selects a set of onion routers up to the destination by checking in its existing list of onion routers. It then uses public key cryptography to construct the onions in such a way that only the intended onion routers can peel off the outer layer. The following example illustrates the process. Consider the case where there are n onion routers numbered from 1 to n. The public and the private key of a particular router say i is denoted by I pu and I pr respectively. The onion proxy knows the public keys of all the onion routers in its list. The private keys are known only to that particular router. An encryption and decryption function is used to encrypt and decrypt the data. The encryption function is E key (data) and the decryption function is D key (data). Data encrypted by a public key can be decrypted by a private key and vice versa. Hence we have D I_public_key ( E I_private_key (data)) = data. D I_private_key ( E I_public_key (data)) = data Structure of onion at intermediate nodes 6

7 On receiving a packet the onion proxy selects a random sequence of routers from its list say 4, 3 and 5. So it constructs the onion in the following manner. It first encrypts the data packet with public key of 5 followed by public key of 3 and finally 4. So the encrypted data now looks like E 4pu (3 s IP address, E 3pu ((5 s IP address, (E 5pu (recipient s IP address, data))))). This is then sent to onion router 4. Onion router 4 uses its private key to peel the outermost encryption layer. It finds the IP address of the next hop i.e. router 3. So it passes to router 3 the onion which now looks like E 3pu ((5 s IP address, (E 5pu (recipient s IP address, data)))). Again router 5 uses its private key to peel the outermost encryption layer. It finds the data and the recipient s IP address and concludes that it is the final anonymous hop to the destination. It simply forwards the packet to the destination. Thus sending an onion over a chosen path creates a virtual circuit. This circuit is bidirectional i.e. the destination can also send a message to the source along the same path. In the given example it simply encrypts the data with its private key and forwards it to onion router 5. E recipient_private (IP address, data). Onion router 5 then encrypts it with its private key and forwards it to 3 as E 5pr (E recipient_private (IP address, data)). Similarly router 3 and 4 also encrypt it step by step with their private key and outer 4 sends it to the onion proxy that initiated connection with it. The data that is received by the onion proxy looks like E 4pr (E 3pr (E 5pr (E recipient_private (IP address, data)))). The onion proxy now uses the public keys of these routers and decrypts each layer of the onion, using the outermost layers key first. It retrieves the data and simply routes it to the sender. Since the size of the onion reduces as it nears the destination an attacker can infer details about the destination. To avoid this onions are padded at each onion router to maintain the size of the onion. Padding is simply adding redundancy. This is a really big advantage because it complicates traffic analysis, as an attacker cannot infer location or other details of the destination by getting hold of an onion. Every onion router has details of only its previous and next hop. So even if an onion router has been compromised the attacker can only get the encrypted onion with the next hop. He will not be able to decrypt the onion without the private keys and hence will not infer any valuable information from it. Each layer of onion also contains an expiration time. An onion router is to ignore expired and replayed onions. Further if the connection breaks during the routing process then all the onion routers are informed via a destroy message. Ensuring that all onion are of the same size, timing information of the circuit is obfuscated and adding noise makes traffic analysis very difficult. 3.4 Vulnerabilities of Onion Routing: It is susceptible to denial of service attacks. This can be done by forcing onion routers to do a large number of cryptographic operations by many sending packets to it. Eventually the router simply ends up doing cryptographic operations and is not able to forward packets. This can be mitigated using client puzzles. Here the onion proxy (i.e. the server) forces a requesting client to complete a puzzle before it allocates resources. This forces an attacker to find 7

8 additional resources. But puzzle solving has an impact on the latency although it reduces DOS vulnerability. An attacker can record data going on between routers and can compromise a router at a later stage, to acquire private key and decrypt data. This can be avoided by using a session key between communicating parties. The session key is used to encrypt data and is valid only for the duration of the communication. 3.5 Advantages of Onion Routing: It supports multiple applications like , web browsing etc. A tunable configuration allows various degree of protection to individual users. Data is unreadable throughout the route except at the end points. 3.6 Problems of Onion Routing in Wireless Networks: In a wireless medium there is node mobility and lack of infrastructure. There is no central point governing the flow of traffic. So nodes rely on intermediate nodes to relay their data. If intermediate nodes are compromised then onion routing fails. Also packets are broadcast into the network. Thus traffic analysis becomes easier and may go undetected. Lack of central management makes it susceptible to active attacks. It takes longer to construct paths due to the dynamic nature of the environment. Key distribution for encrypting traffic is a challenge. 4 Onion Routing in Wireless Networks: As it can be seen, the problems in wireless networks pertaining to security are manifold. Some modifications have to be made to the protocols in the wired network so that it can fit the wireless scenario. Currently there is a lot of research that is on to come up with an optimal protocol for defeating traffic analysis in the wireless environment. All the protocols have onion routing and traffic mixing at their core. There are many protocols for the same but I shall briefly review only three of them in this paper. 4.1 Wireless Anonymous Routing (WAR) [8]: It is based on onion routing and traffic mixing. Here the keys are distributed using a RadioGram. RadioGram object is like an onion which has layers of encryption around the data content. RadioGrams are broadcast into the network and the intended nodes along the route to the destination decrypt a layer at a time Description: The structure of a radiogram is as follows: [tid] {[sk] [MIC] [^]}{[sk] [MIC] [^]. {[sk] [MIC] [^]} [content] [padding] 8

9 The information contained within the curly braces {} represent each layer of the onion. Transmitter ID i.e. tid: It uniquely defines a radiogram. It is a RSA public key. It is used to encrypt the session key. And the session key is then used to encrypt the rest of the fields. Session key i.e. sk: It is a symmetric key encrypted by the public key of the transmitter. MIC or Checksum: It is the pre-computed hash value of everything the onion skin wraps except the padding. Control Signals i.e. ^: It tells the receiver what has to be done with the received message. It also tells about the type of message and the padding. Content: This is the actual data that is being transmitted and can be interpreted only by the final destination. Padding: This is used just to maintain the size of the onion. Without padding the onion can grow smaller as it nears the destination and can be analyzed easily by an attacker Example: Node A wishes to send data to C via B. B is in the wireless range of A and C is within B s wireless range. A B C. So A performs the following steps to construct the RadioGram and broadcasts it. [A.id] [B.sk] [B.MIC] [B.^] [C.sk] [C.MIC] [C.^] [content] [padding] 1. A generates the content [content]. 2. It then generates a random session key (16 byte) C.sk. 3. It sets the control signal C.^ appropriately i.e. type= MESSAGE and padding = k bits. 4. It prepends [C.^] to [ content] 5. It computes a 16 byte MIC over [C.sk] [C.^] [content] and calls it C.MIC. 6. It encrypts [C.MIC] [C.^] [content] under C.sk. 7. It encrypts C.sk using C s public key and calls it C.sk. 8. It prepends [C.sk ] to [C.MIC] [C.^] [content]. 9. Append any padding if reqired. 10. It renames [C.sk ] [C.MIC] [C.^] [content] to [content] 11. It repeats the above steps for (all other intermediate nodes) B. When the nodes within the transmission range of A receive the Radiogram they perform the following steps: 1. They strip A.id and save it 2. They strip B.MIC and save it. 3. They strip the encrypted B.sk. 4. They try to decrypt B.sk to B.sk using their private key. (If it succeeds then they are the intended recipient else they simply drop the packet. Only B is able to decrypt B.sk as it was encrypted with his public key.) 5. B assumes that the message is for him and now uses B.sk to decrypt the remainder of the message i.e. [B.MIC] [B.^] [content] 6. B checks B.^]to determine where the padding begins and the other rules it is supposed to follow. 9

10 7. B computes B.MIC over [B.sk] [B.^] [content]. 8. It compares B.MIC to B.MIC. If they are equal B checks B.^ for further information. If they are unequal it implies that the packet has been altered and B drops it or logs it as required. 9. It then prepends his transmitter id and puts the packet which looks like [B.id] [C.sk] [C.MIC] [C.^] [content] [padding] on the outgoing queue and broadcasts it. 10. Again all the nodes in B s range perform the above steps. But only C is able to decrypt the message and read it Drawbacks of the WAR protocol: Key distribution is a problem. Time taken for a packet to be delivered to a destination is long because of RSA encryption and decryption. This algorithm relies on public key cryptography. The sender needs to know the topology of the entire network as there is no route discovery. It does not ensure packet delivery because if an intermediate node on the destination path fails then the packet will never reach the destination. A node has to perform a certain number of decryptions just so that it can determine if it is the intended node on the route to the destination It is susceptible to DDOS attacks because an attacker can send keep broadcasting packets and force the legitimate nodes on a root to do a large number of decryptions. Thus a valid packet may not be transmitted. 4.2 Secure Distributed Anonymous Routing Protocol (SDAR) [10]: This protocol is also based on onion routing and encrypting the packet header thus abstaining from using unreliable intermediate node. It does not require the source node to know the entire network topology unlike the previous WAR protocol. Here the source node broadcasts a path discovery packet with certain trust requirement. All intermediate nodes satisfying these requirements add their IDs and a session key into the path discovery packet and forward it. This goes on till the packet reaches the destination. On receiving the path discovery packet, the destination encapsulates the information of all the intermediate nodes in a multilayered message and sends it on the reverse path to the source node. Each node on the reverse path decrypt one layer and keep forwarding the message till it reaches the source node. When the packet reaches the source node it has information about all the trusted intermediate nodes and their session keys. It uses these keys to encrypt the data and forwards it along the discovered route. This protocol defines a node n s community which is a set of neighboring nodes that is one hop away from the node n, including n. A node maintains a list of its one hop neighbors by listening to the HELLO messages which are periodically broadcast by each node. The HELLO messages contain the public key of the node. A trust level is also set for each node, which is the cumulative value of its past behavior, computed by its neighbors over a period of time. In each community the central node classifies its neighboring nodes into three classes of trust; high medium and low. It generates two different keys for medium and high trust level and shares it with its neighbors. And all nodes belonging to 10

11 a particular trust level share the same key. The central node updates the community key whenever the trust level of its neighbors change or a node leaves the community. During community key distribution the central node encrypts it with the public key of the intended neighbor for better protection Detailed description: SDAR is divided into three parts; path discovery, path reverse and data transfer. Path discovery: This allows the source node S to establish a path up to the destination using intermediate nodes. But the beauty of this phase is that none of the intermediate nodes can discover the identity of any of the participating nodes except its neighbors. The source S creates a path discovery packet and broadcasts it. The path discovery consists of five parts. Part 1: Open part 1. TYPE: This is the message type. 2. TRUST_REQ: This tells the trust requirement for the message; i.e. low, medium or high. 3. TPK: It is a one time public key generated by the source node for each path discovery session. Thus it serves as a unique message id. It is used by intermediate nodes to encrypt routing information. Part 2: Encrypted with public key of the receiver PK R 1. ID R : This is the id of the receiver. 2. K s : This is a symmetric session key generated by the source node. 3. PL s : This gives the length of the padding in the third part. Part 3: Open part 1. P s : It contains the padding generated by the source node and is used to hide the real routing information. Part 4: Encrypted with session key K s 1. ID s : This is the id of the source node S. 2. PK s : This is the public key of the source node. 3. TPK: It is a one time public key generated by the source node for each path discovery session. 4. TSK: This is the corresponding private key used by the receiver to decrypt and verify routing information in the message. 5. SN session_ids : It is a random number generated by the source and is mapped to encryption key Ks. 6. Sign s (M): This protects the integrity of the message. Part 5: Encrypted with TPK 11

12 This part contains the information about the intermediate nodes on the route to the destination. 1. ID i : This is the id of the intermediate node i. 2. K i : This is the session key generated by node i. 3. SN session_ids : It is a random number generated by the node and is mapped to encryption key Ki. 4. Sign s (M): This is the signature of the received message. Each node along the route maintains a table that contains a table that maintains the random number generated for the session, the encryption key, the ancestor node and the successor node. Path reverse: When the receiver receives the path discovery message it puts in the ids and session keys of all the intermediate nodes into one message. It encrypts this message again and again with the session keys of the intermediate nodes beginning from the last node. It then broadcasts the packet. Every node along the reverse path removes a layer of encryption and broadcasts the packet. So when the source receives the message it has the ids and keys of all the nodes on the path to the destination. It uses these keys to encrypt the data and broadcasts it. Data Transfer: The source encrypts the data using the keys of the intermediate nodes and broadcasts it. Each node on the way decrypts a layer and forwards it. So when the message reaches the destination all the encryption layers have been peeled off and the receiver is able to read the message Example: Node A wishes to send data to C via B. B is in the wireless range of A and C is within B s wireless range. A B C. So A prepares the route discovery packet following the above steps and broadcasts it. When the nodes within the transmission range of A receive the packet they perform the following steps: 1. Check if the message has been received before by checking the TPK in part 1 of the message. If another message with this TPK has arrived before then drop the packet silently and stop, else goto the next step. 2. Try to decrypt the message using the community key. If it doesn t decrypt, it implies that the node is not on the intended next hop so stop, else goto the next step. 3. Use the private key PK R and try decrypting part 2. If the node is unable to decrypt it then it is not the intended receiver, so goto step 4 else decrypt part 2 and compare the ID R in it with its own id. If they do not match then is not the intended receiver, so goto step 4. (Since B is not the intended receiver it goes to step 4.) 4. Add the following in part 5 of the message, encrypted with TPK: a. ID B : Id of node B. K B : Session key generated by B. SN path_idb : Randomly generated number for the session. Signature of the original received message. b. Broadcast the message c. Add < SN path_idb, ID A, k B > in its internal table. 12

13 5. Now when the packet is received by B s neighbors they perform step 4 as they are not the intended receivers except for C. C performs the following steps: a. Decrypt part 2 with its private key and use the padding length PL s to find the offset for the fourth part and use K s from part 2 to decrypt part 4. b. Then use TSK obtained from part 4 to decrypt part 5 to get the session keys of all the nodes on its path i.e. B. c. Put the node ids and their session keys (here only B s id and session key) in a message and encrypt the message many times with the session key of all the intermediate nodes. The encryption keys are applied in the reverse order. d. Broadcast the message. 6. This triggers the path reverse process. The receiver composes a message and puts in the id, session key and random number associated with each intermediate node. It then encrypts the message using the session key of each intermediate node and broadcasts it. 7. All intermediate nodes on the way to the destination peel an encryption layer and forward the packet. This goes on till the packet reaches the destination Drawbacks of the SDAR protocol: There is no control over the route length since the path to the destination is a discovery process. Hence it may take a really long time for the actual data transfer to begin. If malicious nodes keep forwarding path discovery packet amongst each other then it may never reach the intended receiver Advantages of the SDAR protocol: The source need not know the topology of the entire network since path discovery is a dynamic process. Hence traffic analysis becomes more difficult. Symmetric keys of intermediate nodes are collected using a global trapdoor managed by the source and destination nodes, thus providing anonymity and end to end data privacy. 5 Anonymous Routing Protocol for Mobile Ad-hoc Networks (ARM) [12]: 5.1 Assumptions: This protocol is also based on the concept of onion routing. Like the previous protocol it is divided into 3 phases; route discovery, route reply and data forwarding. This protocol makes a few assumptions as follows: Every node in the network has a permanent identity known to all other nodes in the network. The source and destination share a secret key K SD and a secret pseudonym. A pseudonym between a source and a destination can be used only for one RREQ i.e. it acts as a unique identifier for RREQ. Nodes share pseudonyms and secret keys only with a limited set of other nodes. Every node establishes a broadcast key with its one hop neighborhood. 13

14 5.2 Description: The protocol takes place in three parts namely route discovery, route reply and data forwarding. Route Discovery: A source node S wishes to send a message to the destination D. They share a secret key K SD and pseudonym for D is Nym SD. S performs the following steps: 1. It generates an asymmetric key pair pub D and priv D. 2. It generates a secret key k. 3. It generates trapdoor identifier id dest that can be only opened by the destination knowing K SD. id dest = K SD [D, k, priv D ], k[nym SD ]. 4. It generates a pair of link identifiers (n s, k s ).These ids are used to recognize the RREP packets. 5. It encrypts the link ids with public key of destination. 6. It broadcasts the packet: Nym SD, ttl, pub D, id dest, pub D (n s, k s ). When a node receives Ni receives a RREQ it performs the following steps: 1. It checks if it is the destination by verifying whether Nym SD exists in its list of valid pseudonyms. 2. If yes then it decrypts id dest using K SD and goes to step 3 else it goes to step It checks too see if the first part in the trapdoor identifier matches with its id. If not, then it implies that the node is not the intended destination. 4. Irrespective of the result of step 3 it checks if has been already recorded in its routing table. If yes, then the node discards the message else it goes to step It checks if ttl <= 1. If it is, then it decrements ttl by 1 and generates a random pair of link identifiers (n i, k i ). 6. It appends (n i, k i ) to the received encrypted link identifiers and encrypts everything with public key of the destination. 7. It stores < Nym SD, n i, k i, k[nym SD ] > in its routing table and broadcasts the following message Nym SD, ttl, pub D, id dest, (pub D.(pub D (n i-1, k i-1 ), n i, k i ) 8. If Ni is not the intended destination it fills the link identifiers with random data of appropriate length and broadcasts it. When the destination node receives a route request packet it uses the link identifiers of all the intermediate nodes to create a reply onion. The detailed steps are explained below: 9. Node D receives a message Nym SD, ttl, pub D, id dest, (pub D.(pub D (n i-1, k i-1 ), n i, k i ). 10. It decrypts id dest to get k. 11. It uses its private key to get link identifiers of all the intermediate nodes on the route. 12. It constructs a reply onion which contains the link ids of all the intermediate nodes and encrypts them several times using the ids of intermediate nodes in the reverse order. 13. It generates a random ttl and broadcasts this route reply packet as K D [NYM SD, ttl], onion. 14

15 Route Reply: The destination wraps all the link ids of the intermediate nodes in a message and encrypts the packet with the keys of all the intermediate nodes on the route before forwarding it. When a node N i receives a route reply packet it performs the following steps: 1. It checks if it has forwarded a RREQ packet with the pseudonym NYM SD. 2. If no, it goes to step 3, else it goes to step It replaces the onion by random data, decrements ttl and broadcasts packet. 4. It checks if it has received a RREP with the same identifier i.e. pseudonym. If yes, then it performs step 3 else it goes to step It decrypts the onion using k i and checks if the first part of the message is equal to its id N i. 6. If yes, then it decrypts NYM SD using the k it retrieved from the RREP and checks if it equal to NYM SD. If they are not equal then the packet is discarded, else it goes to step Node Ni strips a layer of the reply onion and generates a new random ttl and broadcasts the RREP packet. Data Forwarding: When the source receives a RREP for its RREQ it sends the DATA message to the destination. DATA messages will have one time identifiers attached to them similar to RREQ messages. This identifier allows a node on the route to recognize the fact that it is the next hop and that it should forward the message. Forwarding data messages is similar to forwarding RREP messages using the same ttl scheme, but without padding. 5.3 Advantages of the ARM protocol: No cryptographic operations are required for a node to be able to recognize that it is the intended recipient. It effectively hides the routes in the network. A node on the network that receives a message from its source cannot determine if it is the source of the message or a mere forwarder. 6 Conclusion: Security is an important aspect of communication over the web. Mere encryption of messages doesn t keep it from malicious attackers. An attacker can gain a lot of information by indirect traffic analysis as can be seen from the study above. Hence it becomes very essential to mitigate traffic analysis. Onion routing is by far the best solution for maintaining anonymity over the web. In onion routing (for wired networks) data is wrapped under multiple layers of encryption and forwarded towards the destination and each node on the route decrypts a layer and forwards it. But certain modifications need to be made while applying onion routing on the wireless network. Wireless networks are more vulnerable to attacks due to lack of central management, dynamic nature of the network, broadcast nature of packet forwarding etc. Thus onion routing is modified appropriately to suit the wireless environment. WAR, SDAR, ARM provide anonymity to a great deal although they have drawbacks. Research is currently on in this field to develop more and more better suited protocols that can be more resilient towards traffic analysis. 15

16 7 References: I] II] III] IV] 1] Mary Elisabeth Gaup Moe. Security Models for Anonymous Routing. Norwegian University of Science and Technology. 2] George Danezis. Introducing traffic Analysis- Attacks, Defenses and public Policy Issues. Invited Talk. 3] Yih Chun Hu, Adrian Perrig. A Survey of Secure Wireless Ad Hoc Routing. University of California- Berkeley, Carnegie Mellon University. 4] Adam Back, Ulf Moller, Anton Stiglic. Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems. Zero-knowledge Systems Inc. 5] Marc O Morain, Vladislav Titov, Wendy Verbuggen. Onion Routing for Anonymous Communication. 6] Michael G. Reed, Paul F. Syverson, David M. Goldschlag. Proxies for anonymous Routing. Naval Research Laboratory, Washington DC. 7] Nicholas A. Fraser, Richard A. Raines, Rusty O. Baldwin. Tor: An Anonymous Routing Network for Covert On-line Operations. Air Force Institute of Technology, Wright Patterson AFB. 8] Michael E. Locasto, Clayton Chen, Ajay Nambi. WAR: Wireless Anonymous Routing. Department of Computer Science, Columbia University. 9] Liu Yang, Markus Jacobson, Susanne Wetzel. Discount Anonymous On Demand Routing for Mobile Ad hoc Networks. 10] Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry Korba. SDAR: A Secure Distributed Anonymous Routing Protocol. University of Ottawa. 11] Dehn Sy, Rex Chen, Lichun Bao. ODAR: On-Demand Anonymous Routing in Ad-Hoc Networks. University of California. 12] Stefaan Seys, Bart Preneel. ARM: Anonymous Routing Protocol for Mobile Ad hoc Networks. Department of Electrical Engineering-ESAT, SCD/COSIC 16

Anonymous Connections and Onion Routing

Anonymous Connections and Onion Routing Anonymous Connections and Onion Routing David Goldschlag, Michael Reed, and Paul Syverson Center for High Assurance Computer Systems Naval Research Laboratory Washington, D.C. 1 Who is Talking to Whom?

More information

Onion Routing. Submitted By, Harikrishnan S Ramji Nagariya Sai Sambhu J

Onion Routing. Submitted By, Harikrishnan S Ramji Nagariya Sai Sambhu J Onion Routing Submitted By, Harikrishnan S Ramji Nagariya Sai Sambhu J Motivation Public Network Encryption does not hide Routing Information Traffic Analysis Who is Talking to Whom? by analyzing the traffic

More information

0x1A Great Papers in Computer Security

0x1A Great Papers in Computer Security CS 380S 0x1A Great Papers in Computer Security Vitaly Shmatikov http://www.cs.utexas.edu/~shmat/courses/cs380s/ Privacy on Public Networks Internet is designed as a public network Wi-Fi access points,

More information

Onion Routing. Varun Pandey Dept. of Computer Science, Virginia Tech. CS 6204, Spring

Onion Routing. Varun Pandey Dept. of Computer Science, Virginia Tech. CS 6204, Spring Onion Routing Varun Pandey Dept. of Computer Science, Virginia Tech 1 What is Onion Routing? a distributed overlay network to anonymize TCP based routing Circuit based (clients choose the circuit) Each

More information

ANONYMOUS CONNECTIONS AND ONION ROUTING

ANONYMOUS CONNECTIONS AND ONION ROUTING I J C I T A E Serials Publications 6(1) 2012 : 31-37 ANONYMOUS CONNECTIONS AND ONION ROUTING NILESH MADHUKAR PATIL 1 AND CHELPA LINGAM 2 1 Lecturer, I. T. Dept., Rajiv Gandhi Institute of Technology, Mumbai

More information

A SIMPLE INTRODUCTION TO TOR

A SIMPLE INTRODUCTION TO TOR A SIMPLE INTRODUCTION TO TOR The Onion Router Fabrizio d'amore May 2015 Tor 2 Privacy on Public Networks Internet is designed as a public network Wi-Fi access points, network routers see all traffic that

More information

Challenges in Mobile Ad Hoc Network

Challenges in Mobile Ad Hoc Network American Journal of Engineering Research (AJER) e-issn: 2320-0847 p-issn : 2320-0936 Volume-5, Issue-5, pp-210-216 www.ajer.org Research Paper Challenges in Mobile Ad Hoc Network Reshma S. Patil 1, Dr.

More information

Strongly Anonymous Communications in Mobile Ad Hoc Networks

Strongly Anonymous Communications in Mobile Ad Hoc Networks Strongly Anonymous Communications in Mobile Ad Hoc Networks Y.Dong 1, V.O.K.Li 1, S.M.Yiu 2 and C.K.Hui 2 Dept. of Electrical and Electronic Engineering, the University of Hong Kong 1 Dept. of Computer

More information

Onion Routing. 1) Introduction. 2) Operations. by Harikrishnan S (M.Tech CSE) Ramji Nagariya (M.S CSE), Sai Sambhu J (M.Tech CSE).

Onion Routing. 1) Introduction. 2) Operations. by Harikrishnan S (M.Tech CSE) Ramji Nagariya (M.S CSE), Sai Sambhu J (M.Tech CSE). Onion Routing by Harikrishnan S (M.Tech CSE) Ramji Nagariya (M.S CSE), Sai Sambhu J (M.Tech CSE). 1) Introduction Onion routing is an infrastructure for private communication over a public network. Traffic

More information

Anonymous Routing in Ad-hoc Networks

Anonymous Routing in Ad-hoc Networks Mercedes Rodríguez-García (mrodriguezgarci@uoc.edu) Helena Rifà-Pous (hrifa@uoc.edu) Universitat Oberta de Catalunya Working Paper Working Paper Series WP00-000 Research group: K-ryptography and Information

More information

CS526: Information security

CS526: Information security Cristina Nita-Rotaru CS526: Information security Anonymity systems. Based on slides by Chi Bun Chan 1: Terminology. Anonymity Anonymity (``without name ) means that a person is not identifiable within

More information

ANET: An Anonymous Networking Protocol

ANET: An Anonymous Networking Protocol ANET: An Anonymous Networking Protocol Casey Marshall csm@soe.ucsc.edu May 31, 2005 Abstract This paper presents a simple, anonymizing network protocol. Its primary goal is to provide untraceability of

More information

ENEE 459-C Computer Security. Security protocols

ENEE 459-C Computer Security. Security protocols ENEE 459-C Computer Security Security protocols Key Agreement: Diffie-Hellman Protocol Key agreement protocol, both A and B contribute to the key Setup: p prime and g generator of Z p *, p and g public.

More information

ENEE 459-C Computer Security. Security protocols (continued)

ENEE 459-C Computer Security. Security protocols (continued) ENEE 459-C Computer Security Security protocols (continued) Key Agreement: Diffie-Hellman Protocol Key agreement protocol, both A and B contribute to the key Setup: p prime and g generator of Z p *, p

More information

Anonymous Communication: DC-nets, Crowds, Onion Routing. Simone Fischer-Hübner PETs PhD course Spring 2012

Anonymous Communication: DC-nets, Crowds, Onion Routing. Simone Fischer-Hübner PETs PhD course Spring 2012 Anonymous Communication: DC-nets, Crowds, Onion Routing Simone Fischer-Hübner PETs PhD course Spring 2012 DC (Dining Cryptographers) nets [Chaum 1988 ] Chaum, CACM 28(10), October 1985 Who paid for the

More information

Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs

Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs Savithru Lokanath 1, Aravind Thayur 2 1 Department of Electronics & Communication Engineering, DayanandaSagar College of Engineering,

More information

THE SECOND GENERATION ONION ROUTER. Roger Dingledine Nick Mathewson Paul Syverson. -Presented by Arindam Paul

THE SECOND GENERATION ONION ROUTER. Roger Dingledine Nick Mathewson Paul Syverson. -Presented by Arindam Paul THE SECOND GENERATION ONION ROUTER Roger Dingledine Nick Mathewson Paul Syverson 1 -Presented by Arindam Paul Menu Motivation: Why do we need Onion Routing? Introduction : What is TOR? Basic TOR Design

More information

Protocols for Anonymous Communication

Protocols for Anonymous Communication 18734: Foundations of Privacy Protocols for Anonymous Communication Anupam Datta CMU Fall 2016 Privacy on Public Networks } Internet is designed as a public network } Machines on your LAN may see your

More information

2 Application Support via Proxies Onion Routing can be used with applications that are proxy-aware, as well as several non-proxy-aware applications, w

2 Application Support via Proxies Onion Routing can be used with applications that are proxy-aware, as well as several non-proxy-aware applications, w Onion Routing for Anonymous and Private Internet Connections David Goldschlag Michael Reed y Paul Syverson y January 28, 1999 1 Introduction Preserving privacy means not only hiding the content of messages,

More information

SECURE ROUTING PROTOCOLS IN AD HOC NETWORKS

SECURE ROUTING PROTOCOLS IN AD HOC NETWORKS SECURE ROUTING PROTOCOLS IN AD HOC NETWORKS INTRODUCTION 1. With the advancement in radio technologies like Bluetooth, IEEE 802.11or Hiperlan, a new concept of networking has emerged, known as ad hoc networks,

More information

Context. Protocols for anonymity. Routing information can reveal who you are! Routing information can reveal who you are!

Context. Protocols for anonymity. Routing information can reveal who you are! Routing information can reveal who you are! Context Protocols for anonymity The nternet is a public network: Myrto Arapinis School of nformatics University of Edinburgh Routing information is public: P packet headers contain source and destination

More information

CS Paul Krzyzanowski

CS Paul Krzyzanowski Computer Security 17. Tor & Anonymous Connectivity Anonymous Connectivity Paul Krzyzanowski Rutgers University Spring 2018 1 2 Anonymity on the Internet Often considered bad Only criminals need to hide

More information

SMART: A Secure Multipath Anonymous Routing Technique

SMART: A Secure Multipath Anonymous Routing Technique SMART: A Secure Multipath Anonymous Routing Technique Prateek Jain & Rupsha Bagchi Manipal Institute of Technology, Manipal University, Manipal, 576104, Karnataka, India E-mail : jainprateek_90@yahoo.com

More information

Peer-to-Peer Networks 14 Security. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg

Peer-to-Peer Networks 14 Security. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg Peer-to-Peer Networks 14 Security Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg Cryptography in a Nutshelf Symmetric Cryptography - AES - Affine Cryptosystems

More information

Privacy defense on the Internet. Csaba Kiraly

Privacy defense on the Internet. Csaba Kiraly Advanced Networking Privacy defense on the Internet Csaba Kiraly 1 Topics Anonymity on the Internet Chaum Mix Mix network & Onion Routing Low-latency anonymous routing 2 Anonymity: Chaum mix David L. Chaum

More information

Achieving Privacy in Mesh Networks

Achieving Privacy in Mesh Networks Achieving Privacy in Mesh Networks Xiaoxin Wu Intel China Research Center Ltd Beijing, China xiaoxin.wu@intel.com Ninghui Li Department of Computer Science Purdue University West Lafayette, IN 47907-2086,

More information

Computer Security. 15. Tor & Anonymous Connectivity. Paul Krzyzanowski. Rutgers University. Spring 2017

Computer Security. 15. Tor & Anonymous Connectivity. Paul Krzyzanowski. Rutgers University. Spring 2017 Computer Security 15. Tor & Anonymous Connectivity Paul Krzyzanowski Rutgers University Spring 2017 April 24, 2017 CS 419 2017 Paul Krzyzanowski 1 Private Browsing Browsers offer a "private" browsing modes

More information

Private Browsing. Computer Security. Is private browsing private? Goal. Tor & The Tor Browser. History. Browsers offer a "private" browsing modes

Private Browsing. Computer Security. Is private browsing private? Goal. Tor & The Tor Browser. History. Browsers offer a private browsing modes Private Browsing Computer Security 16. Tor & Anonymous Connectivity Paul Krzyzanowski Rutgers University Spring 2017 Browsers offer a "private" browsing modes Apple Private Browsing, Mozilla Private Browsing,

More information

Introduction and Statement of the Problem

Introduction and Statement of the Problem Chapter 1 Introduction and Statement of the Problem 1.1 Introduction Unlike conventional cellular wireless mobile networks that rely on centralized infrastructure to support mobility. An Adhoc network

More information

A REVIEW PAPER ON DETECTION AND PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK

A REVIEW PAPER ON DETECTION AND PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK A REVIEW PAPER ON DETECTION AND PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK Parmar Amish 1, V.B. Vaghela 2 1 PG Scholar, Department of E&C, SPCE, Visnagar, Gujarat, (India) 2 Head of Department

More information

Privacy Protection over Network Communication in Manet

Privacy Protection over Network Communication in Manet Privacy Protection over Network Communication in Manet 1 Dr.K.Rajangam., Head of EEE Department, SCAD Institute of Technology 2 Ms.L.Dhanam, Assistant Professor Department of Computer Science & Engineering,

More information

Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur

Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 38 A Tutorial on Network Protocols

More information

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L CS 3461/5461: Introduction to Computer Networking and Internet Technologies Network Security Study: 21.1 21.5 Kannan Srinivasan 11-27-2012 Security Attacks, Services and Mechanisms Security Attack: Any

More information

Chaum, Untraceable Electronic Mail, Return Addresses, and Digital Pseudonym, Communications of the ACM, 24:2, Feb. 1981

Chaum, Untraceable Electronic Mail, Return Addresses, and Digital Pseudonym, Communications of the ACM, 24:2, Feb. 1981 Anonymizing Networks Chaum, Untraceable Electronic Mail, Return Addresses, and Digital Pseudonym, Communications of the ACM, 24:2, Feb. 1981 Reed, Syverson, Goldschlag, Anonymous Connections and Onion

More information

Anonymity. Assumption: If we know IP address, we know identity

Anonymity. Assumption: If we know IP address, we know identity 03--4 Anonymity Some degree of anonymity from using pseudonyms However, anonymity is always limited by address TCP will reveal your address address together with ISP cooperation Anonymity is broken We

More information

Network Security and Cryptography. December Sample Exam Marking Scheme

Network Security and Cryptography. December Sample Exam Marking Scheme Network Security and Cryptography December 2015 Sample Exam Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers

More information

CS 134 Winter Privacy and Anonymity

CS 134 Winter Privacy and Anonymity CS 134 Winter 2016 Privacy and Anonymity 1 Privacy Privacy and Society Basic individual right & desire Relevant to corporations & government agencies Recently increased awareness However, general public

More information

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link. Internet Layers Application Application Transport Transport Network Network Network Network Link Link Link Link Ethernet Fiber Optics Physical Layer Wi-Fi ARP requests and responses IP: 192.168.1.1 MAC:

More information

Anonymity With Tor. The Onion Router. July 21, Technische Universität München

Anonymity With Tor. The Onion Router. July 21, Technische Universität München The Onion Router Nathan S. Evans Christian Grothoff Technische Universität München July 21, 2011 Overview What is Tor? Motivation Background Material How Tor Works Hidden Services Attacks Specific Attack

More information

A Novel Secure Routing Protocol for MANETs

A Novel Secure Routing Protocol for MANETs 22 A Novel Secure Routing Protocol for MANETs Zhongwei Zhang University of Southern Queensland Australia 1. Introduction Ad hoc networks is a special kind of wireless network mode. A mobile ad hoc network

More information

Network Security and Cryptography. 2 September Marking Scheme

Network Security and Cryptography. 2 September Marking Scheme Network Security and Cryptography 2 September 2015 Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers to the questions,

More information

Analysing Onion Routing Bachelor-Thesis

Analysing Onion Routing Bachelor-Thesis Analysing Onion Routing Bachelor-Thesis Steffen Michels June 22, 2009 Abstract Although methods for reaching security goals such as secrecy, integrity and authentication are widely used in the Internet,

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

Operating Systems Design Exam 3 Review: Spring Paul Krzyzanowski

Operating Systems Design Exam 3 Review: Spring Paul Krzyzanowski Operating Systems Design Exam 3 Review: Spring 2012 Paul Krzyzanowski pxk@cs.rutgers.edu 1 Question 1 An Ethernet device driver implements the: (a) Data Link layer. (b) Network layer. (c) Transport layer.

More information

Data Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II

Data Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II Data Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II Hello and welcome to today's lecture on secured communication.

More information

Anonymity With Tor. The Onion Router. July 5, It s a series of tubes. Ted Stevens. Technische Universität München

Anonymity With Tor. The Onion Router. July 5, It s a series of tubes. Ted Stevens. Technische Universität München Anonymity With Tor The Onion Router Nathan S. Evans Christian Grothoff Technische Universität München July 5, 2012 It s a series of tubes. Ted Stevens Overview What is Tor? Motivation Background Material

More information

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Lecture 13: Routing in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Routing in multihop networks Figure out a path from source to destination. Basic techniques of routing

More information

Unit 2.

Unit 2. Unit 2 Unit 2 Topics Covered: 1. PROCESS-TO-PROCESS DELIVERY 1. Client-Server 2. Addressing 2. IANA Ranges 3. Socket Addresses 4. Multiplexing and Demultiplexing 5. Connectionless Versus Connection-Oriented

More information

School of Computer Sciences Universiti Sains Malaysia Pulau Pinang

School of Computer Sciences Universiti Sains Malaysia Pulau Pinang School of Computer Sciences Universiti Sains Malaysia Pulau Pinang Information Security & Assurance Assignment 2 White Paper Virtual Private Network (VPN) By Lim Teck Boon (107593) Page 1 Table of Content

More information

A Review on Black Hole Attack in MANET

A Review on Black Hole Attack in MANET A Review on Black Hole Attack in MANET Gourav Ahuja 1, Mrs. Sugandha 2 1 Department of Computer Science and Engineering, VCE, Rohtak, Haryana (India) 2 Asst. Prof., Department of Computer Science and Engineering,

More information

What's the buzz about HORNET?

What's the buzz about HORNET? 1 What's the buzz about HORNET? 2 You've probably all seen the news "Internet-scale anonymity" "Without sacrificing security, the network supports data transfer speeds of up to 93GBps" "can be scaled at

More information

Wireless Network Security Spring 2014

Wireless Network Security Spring 2014 Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #16 Network Privacy & Anonymity 2014 Patrick Tague 1 Network Privacy Issues Network layer interactions in wireless networks often expose

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

(2½ hours) Total Marks: 75

(2½ hours) Total Marks: 75 (2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.

More information

A Report on Modified Onion Routing and its Proof of Concept

A Report on Modified Onion Routing and its Proof of Concept A Report on Modified Onion Routing and its Proof of Concept Introduction: This document briefly describes the architecture, code layout, operation principles and testing covered in the implementation of

More information

Denial of Service and Distributed Denial of Service Attacks

Denial of Service and Distributed Denial of Service Attacks Denial of Service and Distributed Denial of Service Attacks Objectives: 1. To understand denial of service and distributed denial of service. 2. To take a glance about DoS techniques. Distributed denial

More information

Simulation on Agent-based Onion Routing Network *

Simulation on Agent-based Onion Routing Network * National Research Council Canada Institute for Information Technology Conseil national de recherches Canada Institut de technologie de l'information Simulation on Agent-based Onion Routing Network * Song,

More information

Survey on Traffic Pattern Discovery System For MANETs

Survey on Traffic Pattern Discovery System For MANETs Survey on Traffic Pattern Discovery System For MANETs Sanchali S. Pandhare 1 PG student, Department of Computer Science & engineering, Pankaj Laddhad Institute of Technology & Management Studies, Buldana.

More information

Anonymous and Authenticated Routing in Multi-hop Cellular Networks

Anonymous and Authenticated Routing in Multi-hop Cellular Networks Anonymous and Authenticated Routing in Multi-hop Cellular Networks Mohamed Elsalih Mahmoud and Xuemin (Sherman) Shen Department of Electrical and Computer Engineering University of Waterloo, Waterloo,

More information

R (2) Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing.

R (2) Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing. R (2) N (5) Oral (3) Total (10) Dated Sign Experiment No: 1 Problem Definition: Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing. 1.1 Prerequisite:

More information

Anonymity C S A D VA N C E D S E C U R I T Y TO P I C S P R E S E N TAT I O N BY: PA N AY I OTO U M A R KO S 4 T H O F A P R I L

Anonymity C S A D VA N C E D S E C U R I T Y TO P I C S P R E S E N TAT I O N BY: PA N AY I OTO U M A R KO S 4 T H O F A P R I L Anonymity C S 6 8 2 A D VA N C E D S E C U R I T Y TO P I C S P R E S E N TAT I O N BY: PA N AY I OTO U M A R KO S 4 T H O F A P R I L 2 0 1 9 Tor: The Second- Generation Onion Router R. DINGLEDINE N.

More information

Closed book. Closed notes. No electronic device.

Closed book. Closed notes. No electronic device. 414-S17 (Shankar) Exam 3 PRACTICE PROBLEMS Page 1/6 Closed book. Closed notes. No electronic device. 1. Anonymity Sender k-anonymity Receiver k-anonymity Authoritative nameserver Autonomous system BGP

More information

Security and Anonymity

Security and Anonymity Security and Anonymity Distributed Systems need a network to send messages. Any message you send in a network can be looked at by any router or machine it goes through. Further if your machine is on the

More information

International Journal of Advance Engineering and Research Development

International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 5.71 International Journal of Advance Engineering and Research Development Volume 5, Issue 03, March -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 BATCH

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Instructor: Michael Fischer Lecture by Ewa Syta Lecture 25 April 18, 2012 CPSC 467b, Lecture 25 1/44 Anonymous Communication DISSENT- Accountable Anonymous

More information

Anonymous Instant Messaging via P2P Onion Routing. Kyle Thompson

Anonymous Instant Messaging via P2P Onion Routing. Kyle Thompson Anonymous Instant Messaging via P2P Onion Routing Kyle Thompson April 21, 2017 1 Kyle Thompson Honours Project - Page 2 Contents 1 Introduction 3 1.1 Context.................................... 3 1.2 Problem

More information

Anonymous communications: Crowds and Tor

Anonymous communications: Crowds and Tor Anonymous communications: Crowds and Tor Basic concepts What do we want to hide? sender anonymity attacker cannot determine who the sender of a particular message is receiver anonymity attacker cannot

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

Cryptanalysis. Ed Crowley

Cryptanalysis. Ed Crowley Cryptanalysis Ed Crowley 1 Topics Cryptanalysis History Modern Cryptanalysis Characterization of Cryptanalysis Attacks Attack Types 2 Cryptanalysis Science of cracking ciphers and codes, decoding secrets,

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through

More information

Internet Protocol and Transmission Control Protocol

Internet Protocol and Transmission Control Protocol Internet Protocol and Transmission Control Protocol CMSC 414 November 13, 2017 Internet Protcol Recall: 4-bit version 4-bit hdr len 8-bit type of service 16-bit total length (bytes) 8-bit TTL 16-bit identification

More information

Student ID: CS457: Computer Networking Date: 5/8/2007 Name:

Student ID: CS457: Computer Networking Date: 5/8/2007 Name: CS457: Computer Networking Date: 5/8/2007 Name: Instructions: 1. Be sure that you have 10 questions 2. Write your Student ID (email) at the top of every page 3. Be sure to complete the honor statement

More information

Module 28 Mobile IP: Discovery, Registration and Tunneling

Module 28 Mobile IP: Discovery, Registration and Tunneling Module 28 Mobile IP: Discovery, and Tunneling Learning Objectives Introduction to different phases of Mobile IP Understanding how a mobile node search the agents using Discovery process Understand how

More information

CRYPTOGRAPHIC PROTOCOLS: PRACTICAL REVOCATION AND KEY ROTATION

CRYPTOGRAPHIC PROTOCOLS: PRACTICAL REVOCATION AND KEY ROTATION #RSAC SESSION ID: CRYP-W04 CRYPTOGRAPHIC PROTOCOLS: PRACTICAL REVOCATION AND KEY ROTATION Adam Shull Recent Ph.D. Graduate Indiana University Access revocation on the cloud #RSAC sk sk Enc Pub Sym pk k

More information

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing Algorithms Link- State algorithm Each node maintains a view of the whole network topology Find the shortest path

More information

GPSIH: A Generic IP-Based Scheme For Identity Hiding In MANETs.

GPSIH: A Generic IP-Based Scheme For Identity Hiding In MANETs. GPSIH: A Generic IP-Based Scheme For Identity Hiding In MANETs. Yomna M.Mohsen, Mohamed Hamdy and Mohamed Hashem Computer Systems Department Information Systems Department Ain Shams University Cairo, Egypt

More information

A Survey of BGP Security Review

A Survey of BGP Security Review A Survey of BGP Security Review Network Security Instructor:Dr. Shishir Nagaraja Submitted By: Jyoti Leeka November 16, 2011 1 Introduction to the topic and the reason for the topic being interesting Border

More information

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security 1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security Dr. L. Christofi 1 0. Overview As the knowledge of computer networking and protocols has become more widespread, so the threat of

More information

Lecture 6. Internet Security: How the Internet works and some basic vulnerabilities. Thursday 19/11/2015

Lecture 6. Internet Security: How the Internet works and some basic vulnerabilities. Thursday 19/11/2015 Lecture 6 Internet Security: How the Internet works and some basic vulnerabilities Thursday 19/11/2015 Agenda Internet Infrastructure: Review Basic Security Problems Security Issues in Routing Internet

More information

Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. EJ Jung

Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. EJ Jung Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms EJ Jung Goals 1. Hide what you wrote encryption of any kind symmetric/asymmetric/stream 2. Hide to whom you sent and when pseudonym?

More information

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8 CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 8 Announcements Reminder: Project 1 is due on tonight by midnight. Midterm 1 will be held next Thursday, Feb. 8th. Example midterms

More information

Computer Networks. Wenzhong Li. Nanjing University

Computer Networks. Wenzhong Li. Nanjing University Computer Networks Wenzhong Li Nanjing University 1 Chapter 7. Network Security Network Attacks Cryptographic Technologies Message Integrity and Authentication Key Distribution Firewalls Transport Layer

More information

LECTURE 8. Mobile IP

LECTURE 8. Mobile IP 1 LECTURE 8 Mobile IP What is Mobile IP? The Internet protocol as it exists does not support mobility Mobile IP tries to address this issue by creating an anchor for a mobile host that takes care of packet

More information

KALASALINGAM UNIVERSITY

KALASALINGAM UNIVERSITY KALASALINGAM UNIVERSITY (Kalasalingam Academy of Research and Education) DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CLASS NOTES CRYPTOGRAPHY AND NETWOTK SECURITY (CSE 405) Prepared by M.RAJA AP/CSE

More information

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures By Chris Karlof and David Wagner Lukas Wirne Anton Widera 23.11.2017 Table of content 1. Background 2. Sensor Networks vs. Ad-hoc

More information

anonymous routing and mix nets (Tor) Yongdae Kim

anonymous routing and mix nets (Tor) Yongdae Kim anonymous routing and mix nets (Tor) Yongdae Kim Significant fraction of these slides are borrowed from CS155 at Stanford 1 q Why? Anonymous web browsing 1. Discuss health issues or financial matters anonymously

More information

Security Challenges Facing the Future Wireless World (aka.. Alice and Bob in the Wireless Wonderland) Wade Trappe

Security Challenges Facing the Future Wireless World (aka.. Alice and Bob in the Wireless Wonderland) Wade Trappe Security Challenges Facing the Future Wireless World (aka.. Alice and Bob in the Wireless Wonderland) Wade Trappe Talk Overview Security has been one of the great detractors for wireless technologies (and

More information

CS61A Lecture #39: Cryptography

CS61A Lecture #39: Cryptography Announcements: CS61A Lecture #39: Cryptography Homework 13 is up: due Monday. Homework 14 will be judging the contest. HKN surveys on Friday: 7.5 bonus points for filling out their survey on Friday (yes,

More information

Cryptography ThreeB. Ed Crowley. Fall 08

Cryptography ThreeB. Ed Crowley. Fall 08 Cryptography ThreeB Ed Crowley Fall 08 Cryptanalysis History Modern Cryptanalysis Characterization of Cryptanalysis Attacks Attack Types Cryptanalysis. Science of cracking ciphers and codes, decoding secrets,

More information

Overview of SSL/TLS. Luke Anderson. 12 th May University Of Sydney.

Overview of SSL/TLS. Luke Anderson. 12 th May University Of Sydney. Overview of SSL/TLS Luke Anderson luke@lukeanderson.com.au 12 th May 2017 University Of Sydney Overview 1. Introduction 1.1 Raw HTTP 1.2 Introducing SSL/TLS 2. Certificates 3. Attacks Introduction Raw

More information

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Rajneesh Gujral Associate Proffesor (CSE Deptt.) Maharishi Markandeshwar University, Mullana, Ambala Sanjeev Rana Associate

More information

J. A. Drew Hamilton, Jr., Ph.D. Director, Information Assurance Laboratory and Associate Professor Computer Science & Software Engineering

J. A. Drew Hamilton, Jr., Ph.D. Director, Information Assurance Laboratory and Associate Professor Computer Science & Software Engineering Auburn Information Assurance Laboratory J. A. Drew Hamilton, Jr., Ph.D. Director, Information Assurance Laboratory and Associate Professor Computer Science & Software Engineering 107 Dunstan Hall Auburn

More information

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, Nov-Dec 2010

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, Nov-Dec 2010 Network Security: Anonymity Tuomas Aura T-110.5240 Network security Aalto University, Nov-Dec 2010 Outline 1. Anonymity and privacy 2. High-latency anonymous routing 3. Low-latency anonymous routing Tor

More information

AODV Routing Protocol in MANET based on Cryptographic Authentication Method

AODV Routing Protocol in MANET based on Cryptographic Authentication Method IJCSET October 2012 Vol 2, Issue 10, 1459-1464 www.ijcset.net ISSN:2231-0711 AODV Routing Protocol in MANET based on Cryptographic Authentication Method Thandu Naga Srinu Padma CSE,Sri Sunflower College

More information

Goals for Today s Class. EE 122: Networks & Protocols. What Global (non-digital) Communication Network Do You Use Every Day?

Goals for Today s Class. EE 122: Networks & Protocols. What Global (non-digital) Communication Network Do You Use Every Day? Goals for Today s Class EE 122: & Protocols Ion Stoica TAs: Junda Liu, DK Moon, David Zats http://inst.eecs.berkeley.edu/~ee122/fa09 (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues

More information

communication Claudia Díaz Katholieke Universiteit Leuven Dept. Electrical Engineering g ESAT/COSIC October 9, 2007 Claudia Diaz (K.U.

communication Claudia Díaz Katholieke Universiteit Leuven Dept. Electrical Engineering g ESAT/COSIC October 9, 2007 Claudia Diaz (K.U. Introduction to anonymous communication Claudia Díaz Katholieke Universiteit Leuven Dept. Electrical Engineering g ESAT/COSIC October 9, 2007 Claudia Diaz (K.U.Leuven) 1 a few words on the scope of the

More information

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advance Research in Computer Science and Management Studies Volume 3, Issue 8, August 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

Towards measuring anonymity

Towards measuring anonymity Towards measuring anonymity Claudia Díaz, Stefaan Seys, Joris Claessens, and Bart Preneel K.U.Leuven ESAT-COSIC Kasteelpark Arenberg 0, B-300 Leuven-Heverlee, Belgium claudia.diaz@esat.kuleuven.ac.be http://www.esat.kuleuven.ac.be/cosic/

More information

Security Issues In Mobile Ad hoc Network Routing Protocols

Security Issues In Mobile Ad hoc Network Routing Protocols Abstraction Security Issues In Mobile Ad hoc Network Routing Protocols Philip Huynh phuynh@uccs.edu Mobile ad hoc network (MANET) is gaining importance with increasing number of applications. It can be

More information

A Survey - Energy Efficient Routing Protocols in MANET

A Survey - Energy Efficient Routing Protocols in MANET , pp. 163-168 http://dx.doi.org/10.14257/ijfgcn.2016.9.5.16 A Survey - Energy Efficient Routing Protocols in MANET Jyoti Upadhyaya and Nitin Manjhi Department of Computer Science, RGPV University Shriram

More information