The Community for Technology Leaders
RSS Icon
Issue No.09 - September (2011 vol.10)
pp: 1345-1358
Karim El Defrawy , University of California Irvine, Irvine
In most common mobile ad hoc networking (MANET) scenarios, nodes establish communication based on long-lasting public identities. However, in some hostile and suspicious settings, node identities must not be exposed and node movements should be untraceable. Instead, nodes need to communicate on the basis of their current locations. While such MANET settings are not very common, they do occur in military and law enforcement domains and require high security and privacy guarantees. In this paper, we address a number of issues arising in suspicious location-based MANET settings by designing and analyzing a privacy-preserving and secure link-state based routing protocol (ALARM). ALARM uses nodes' current locations to securely disseminate and construct topology snapshots and forward data. With the aid of advanced cryptographic techniques (e.g., group signatures), ALARM provides both security and privacy features, including node authentication, data integrity, anonymity, and untraceability (tracking-resistance). It also offers protection against passive and active insider and outsider attacks. To the best of our knowledge, this work represents the first comprehensive study of security, privacy, and performance tradeoffs in the context of link-state MANET routing.
Privacy, communication system security, communication system routing, mobile communication, location-based communication, military communication.
Karim El Defrawy, "ALARM: Anonymous Location-Aided Routing in Suspicious MANETs", IEEE Transactions on Mobile Computing, vol.10, no. 9, pp. 1345-1358, September 2011, doi:10.1109/TMC.2010.256
[1] EU Cooperative Vehicle-Infrastructure System Project, http:/, 2011.
[2] OpenSSL: The Open Source RToolkit for SSL/TLS, http:/www., 2011.
[3] “OSPF with Digital Signatures,” IETF RFC 2154, http://www.ietf. org/rfcrfc2154.txt, 1997.
[4] G. Ateniese and G. Tsudik, “Some Open Issues and New Directions in Group Signatures,” Proc. Third Int'l Conf. Financial Cryptography, Springer-Verlag, pp. 196-211, 1999.
[5] “A Border Gateway Protocol 4 (BGP-4),” IETF RFC 1771,, 1995.
[6] D. Boneh, X. Boyen, and H. Shacham, “Short Group Signatures,” Proc. 24th Int'l Conf. Cryptology (CRYPTO '04), pp. 41-55, 2004.
[7] D. Boneh and H. Shacham, “Group Signatures with Verifier-local Revocation,” Proc. ACM Conf. Computer and Comm. Security (CCS '04), pp. 168-177, 2004.
[8] A. Boukerche, K. El-Khatib, L. Xua, and L. Korba, “An Efficient Secure Distributed Anonymous Routing Protocol for Mobile and Wireless Ad Hoc Networks,” Computer Comm., vol. 28, pp. 1193-1203, 2005.
[9] E. Bacelli, C. Adjih, and P. Jacquet, “Link State Routing in Wireless Ad-Hoc Networks,” Proc. IEEE Conf. Military Comm., vol. 2, 2003.
[10] G. Calandriello, P. Papadimitratos, J.-P. Hubaux, and A. Lioy, “Efficient and Robust Pseudonymous Authentication in VANET,” Proc. ACM Int'l Workshop Vehicular Ad Hoc Networks (VANET '07), pp. 19-28, Sept. 2007.
[11] T. Camp, J. Boleng, and V. Davies, “A Survey of Mobility Models for Ad Hoc Network Research,” Wireless Comm. and Mobile Computing, Special Issue on Mobile Ad Hoc Networking: Research, Trends, and Applications, vol. 2, pp. 483-502, 2002.
[12] S. Canard and M. Girault, “Implementing Group Signature Schemes with Smart Cards,” Proc. Fifth Smart Card Research and Advanced Application Conf., pp. 1-1, 2002.
[13] S. Carter and A. Yasinsac, “Secure Position Aided Ad Hoc Routing,” Proc. IASTED Int'l Conf. Comm. and Computer Networks (CCN '02), pp. 329-334, 2002.
[14] S. Chen and M. Wu, “Anonymous Multipath Routing Protocol Based on Secret Sharing in Mobile Ad Hoc Networks,” Proc. Int'l Conf. Measuring Technology and Mechatronics Automation (ICMTMA '10), vol. 1, nos. 13/14, pp. 582-585, 2010.
[15] Y. Cheng and D. Agrawal, “Distributed Anonymous Secure Routing Protocol in Wireless Mobile Ad Hoc Networks,” Proc. OPNETWORK, 2005.
[16] W. Diffie and M. Hellman, “New Directions in Cryptography,” IEEE Trans. Information Theory, vol. 22, no. 6, pp. 644-654, Nov. 1976.
[17] Y. Dong, T. Wing Chim, V.O.K. Li, S.M. Yiu, and C.K. Hui, “ARMR: Anonymous Routing Protocol with Multiple Routes for Communications in Mobile Ad Hoc Networks,” Ad Hoc Networks, vol. 7, no. 8, pp. 1536-1550, 2009.
[18] K. El Defrawy and G. Tsudik, “ALARM: Anonymous Location-Aided Routing in Suspicious MANETs,” Proc. IEEE Int'l Conf. Network Protocols (ICNP '07), pp. 304-313, Oct. 2007.
[19] K. El Defrawy and G. Tsudik, “PRISM: Privacy-Friendly Routing in Suspicious MANETs (and VANETs),” Proc. IEEE Int'l Conf. Network Protocols (ICNP '08), pp. 258-267, Oct. 2008.
[20] N. Sadagopan Fan Bai and A. Helmy, “IMPORTANT: A Framework to Systematically Analyze the Impact of Mobility on Performance of Routing Protocols for Adhoc Networks,” Proc. IEEE INFOCOM, vol. 2, pp. 825-835, 2003.
[21] T. Farley, P. McDaniel, and K. Butler, “A Survey of BGP Security Issues and Solutions,” technical report, AT&T Labs - Research, 2004.
[22] X. Hong, M. Gerla, G. Pei, and C. Chinag, “A Group Mobility Model for Ad Hoc Wireless Networks,” Proc. Second ACM Int'l Workshop Modeling, Analysis, and Simulation of Wireless and Mobile Systems (MSWiM '99), pp. 53-60, 1999.
[23] Y.-C. Hu, D.B. Johnson, and A. Perrig, “SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks,” Proc. Fourth IEEE Workshop Mobile Computing Systems and Applications, pp. 3-13, 2002.
[24] Y.-C. Hu and A. Perrig, “A Survey of Secure Wireless Ad Hoc Routing,” IEEE Security and Privacy, vol. 2, no. 3, pp. 28-39, 2004.
[25] Y.-C. Hu, A. Perrig, and D.B. Johnson, “Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks,” Wireless Networks, vol. 11, nos. 1/2, pp. 21-38, 2005.
[26] L. Huang, K. Matsuura, H. Yamane, and K. Sezaki, “Enhancing Wireless Location Privacy Using Silent Period,” Proc. IEEE Wireless Comm. and Networking Conf., vol. 2, pp. 1187-1192, 2005.
[27] A. Ruhil, I. Stojmenovic, and D. Lobiyal, “Voronoi Diagram and Convex Hull Based Geocasting and Routing in Wireless Networks,” Proc. Eighth IEEE Int'l Symp. Computers and Comm. (ISCC '03), vol. 1, pp. 51-56, 2003.
[28] P. Jacquet, P. Muhlethaler, T. Clausen, A. Laouiti, A. Qayyum, and L. Viennot, “Optimized Link State Routing Protocol for Ad Hoc Networks,” pp. 62-68, 2001.
[29] W. jen Hsu, T. Spyropoulos, K. Psounis, and A. Helmy, “Modeling Time-Variant User Mobility in Wireless Mobile Networks,” pp. 758-766, May 2007.
[30] J. Kim and G. Tsudik, “SRDP: Securing Route Discovery in DSR,” Proc. Mobiquitous, 2005.
[31] Y.-B. Ko and N.H. Vaidya, “Location-Aided Routing (LAR) in Mobile Ad Hoc Networks,” Wireless Networks, vol. 6, no. 4, pp. 307-321, 2000.
[32] J. Kong and X. Hong, “ANODR: Anonymous on Demand Routing with Untraceable Routes for Mobile Ad-Hoc Networks,” Proc. ACM MobiHoc, pp. 291-302, 2003.
[33] E.H.J. Kumari and A. Kannammal, “Privacy and Security on Anonymous Routing Protocols in MANET,” Proc. Computer and Electrical Eng. (ICCEE '09), vol. 2, pp. 431-435, 2009.
[34] J. Kurose and K. Ross, “Computer Networks: A Top Down Approach Featuring the Internet,” Computer Networking, Pearson Education, 2005.
[35] W. Liao et al., “GeoGRID: A Geocasting Protocol for Mobile Ad Hoc Networks Based on GRID,” J. Internet Technology, vol. 1, no. 2, 2000.
[36] A. Lysyanskaya, S. Micali, L. Reyzin, and H. Shacham, “Sequential Aggregate Signatures from Trapdoor Permutations,” Proc. Advances in Cryptology (EUROCRYPT '04), pp. 74-90, 2004.
[37] S.L. Murphy and M.R. Badger, “Digital Signature Protection of the ospf Routing Protocol,” Proc. IEEE Symp. Network and Distributed System Security (SNDSS '96), p. 93, 1996.
[38] Nokia 6110 Navigator,, 2011.
[39] “Mobile Ad Hoc Network (MANET) Extension of OSPF,” IETF RFC 5614,, 2009.
[40] R. Perlman, “Network Layer Protocols with Byzantine Robustness,” PhD dissertation, Massachusetts Inst. of Technology, , 1988.
[41] A. Perrig, R. Canetti, J.D. Tygar, and D. Song, “The Tesla Broadcast Authentication Protocol,” RSA CryptoBytes, vol. 5, 2002.
[42] J. Ren, Y. Li, and T. Li, “SPM: Source Privacy for Mobile Ad Hoc Networks,” EURASIP J. Wireless Comm. Networks, vol. 2010, p. 5, 2010.
[43] R.L. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Comm. ACM, vol. 21, no. 2, pp. 120-126, 1978.
[44] E. Schoch, F. Kargl, T. Leinmüller, S. Schlott, and P. Papadimitratos, “Impact of Pseudonym Changes on Geographic Ad Hoc Routing,” Proc. Third European Workshop Security and Privacy in Ad Hoc and Sensor Networks (ESAS '06), vol. 4357, pp. 43-57, 2006.
[45] S. Seys and B. Preneel, “ARM: Anonymous Routing Protocol for Mobile Ad Hoc Networks,” Int'l J. Wireless and Mobile Computing, vol. 3, no. 3, pp. 145-155, 2009.
[46] Simpy Simulator, http:/, 2010.
[47] R. Song, L. Korba, and G. Yee, “AnonDSR: Efficient Anonymous Dynamic Source Routing for Mobile Ad-Hoc Networks,” Proc. Third ACM Workshop Security of Ad Hoc and Sensor Networks (SASN '05), pp. 33-42, 2005.
[48] L. Sweeney, “k-Anonymity: A Model for Protecting Privacy,” Int'l J. Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 5, pp. 557-570, Oct. 2002.
[49] D. Sy, R. Chen, and L. Bao, “ODAR: On-Demand Anonymous Routing in Ad Hoc Networks,” Proc. IEEE Int'l Conf. Mobile Ad Hoc and Sensor Systems (MASS '06), pp. 267-276, Oct. 2006.
[50] H. Takagi and L. Kleinrock, “Optimal Transmission Ranges for Randomly Distributed Packet Radio Terminals,” J. Wireless Networks, vol. 2, no. 4,pp. 329-342 Dec. 1996.
[51] G. Tsudik and S. Xu, “A Flexible Framework for Secret Handshakes,” Proc. Privacy-Enhancing Technologies (PETs '06), 2006.
[52] X. Wu and B. Bhargava, “AO2P: Ad Hoc On-Demand Position-Based Private Routing Protocol,” IEEE Trans. Mobile Computing, vol. 4, no. 4, pp. 335-348, July/Aug. 2005.
[53] “Internet X.509 Public Key Infrastructure Certificate and CRL Profile,” IETF RFC 2459,, 1999.
[54] H. Li, J. Ma, X. Li, and W. Zhang, “An Efficient Anonymous Routing Protocol for Mobile Ad Hoc Networks,” Proc. Information Assurance and Security Conf. (IAS '09), pp. 287-290, 2009.
[55] L. Yang, M. Jakobsson, and S. Wetzel, “Discount Anonymous on Demand Routing for Mobile Ad Hoc Networks,” Proc. SECURECOMM, vol. 28, pp. 1-10, Sept. 2006.
[56] C. Yu, K.G. Shin, and L. Song, “Link-Layer Salvaging for Making Routing Progress in Mobile Ad Hoc Networks,” Proc. Sixth ACM Int'l Symp. Mobile Ad Hoc Networking and Computing, pp. 242-254, 2005.
[57] Y. Zhang, W. Liu, W. Lou, and Y. Fang, “MASK: Anonymous On-Demand Routing in Mobile Ad Hoc Networks,” IEEE Trans. Wireless Comm., vol. 5, no. 9, pp. 2376-2385, Sept. 2006.
[58] B. Zhu, Z. Wan, M.S. Kankanhalli, F. Bao, and R.H. Deng, “Anonymous Secure Routing in Mobile Ad-Hoc Networks,” Proc. 29th Ann. IEEE Int'l Conf. Local Computer Networks, pp. 102-108, Nov. 2004.
686 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool