Improving security and performance of an Ad Hoc network through a multipath routing strategy

Springer Science and Business Media LLC - Tập 4 - Trang 267-278 - 2008
Hervé Aiache1, François Haettel1, Laure Lebrun1, Cédric Tavernier1
1THALES Communications, Colombes, France

Tóm tắt

Privacy and security solutions require today the protection of personal information so that it may not be disclosed to unauthorized participant for illegal purposes. It is a challenge to address these issues in networks with strong constraints such as Ad Hoc network. The security increase is often obtained with a quality of service (QoS) decrease. We propose in this paper a solution that provides at the anonymity, security to Ad Hoc network with a limited impact on QoS. This method could be efficient against some viral attacks. We also give some security proofs of our solution for Ad Hoc networks.

Tài liệu tham khảo

Boukerche, A., El-Khatib, K., Xu, L., Korba, L.: SDAR: A secure distributed anonymous routing protocol for wireless and mobile Ad Hoc networks. In: 29th IEEE International Conference on Local Computer Networks (LCN’04), pp. 618–624, November 2004 Balfanz, D., Durfee, G., Shankar, N., Smetters, D.K., Staddon, J., Wong, H.-C.: Secret handshakes from pairing-based key agreements. In: IEEE Symposium on Security and Privacy, pp. 180–196 (2003) Berthold, O., Federrath, H., Kopsell, S.: Web MIXes: A system for anonymous and unobservable Internet access. In: Federrath, H. (Eds.) DIAU’00, Lecture Notes in Computer Science, vol. 2009, pp. 115–129 (2000) Bhaskar, R., Augot, D., Issarny, V., Sacchetti, D.: An efficient group key agreement protocol for ad hoc networks. IEEE Workshop on Trust, Security and Privacy in Ubiquitous Computing (Affiliated with WoWMoM 2005), Taormina, Italy, 12–16 June 2005 Chaum D.L. (1981). Untraceable electronic mail, return addresses and digital pseudonyms. Commun. ACM 24(2): 84–88 Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: A distributed anonymous information storage and retrieval system. Lecture Notes in Computer Science (2001) Castelluccia, C., Mutaf, P.: Hash-based dynamic source routing. In: IFIP Networking, LNCS, vol. 3042, pp. 101–223 (2004) Clausen, T., Jacquet, P.: Optimized link state routing protocol (OLSR). IETF, Request For Comment 3626, October 2003 Chaum, D.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Commun. ACM 24(2), February 1981 Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Proceedings of 13th Usenix Security Simposyum, August 2004 Dingledine, R., Mathewson, N., Syverson, P.: TOR: The second-generation onion router (2004) Diaz C. and Preneel B. (2004). Reasoning about the anonymity provided by pool mixes that generate dummy traffic. In: Fridrich, J. (eds) Information Hiding LNCS, vol. 3200, pp 309–325. Springer, Heidelberg Daemen, J., Rijmen, V.: The block cipher Rijndael. CARDIS 1998. LNCS, vol. 1820, pp. 247–256 (2000) El-Khatib, K., Korba, L., Song, R., Yee, G.: Secure dynamic distributed routing algorithm for Ad Hoc wireless networks. In: International Conference on Parallel Processing Workshops (ICPPW’03) (2003) Filiol, E.: Computer Viruses: from Theory to Applications. IRIS International Series, Springer, France. ISBN 978-2-287-23939-7 (2005) Filiol, E.: Techniques Virales Avancées. IRIS International Series, Springer, France. ISBN 978-2-287-33887-8 (2007) (An English translation is pending) Freedman, M.J., Morris, R.: Tarzan: a peer-to-peer anonymizing network layer. In: Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002) (2002) Guruswami V. and Sudan M. (1999). Improved decoding of Reed–Solomon and algebraic-geometry codes. IEEE Trans. Inform. Theory 45: 1757–1767 Goldreich O., Rubinfeld R. and Sudan M. (2000). Learning polynomials with queries: the highly noisy case. SIAM J. Discrete Math. 13(4): 535–570 Hu, Y.-C., Johnson, D.B., Perrig, A.: SEAD: Secure efficient distance vector routing for mobile wireless Ad Hoc networks. In: Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002), p. 313, June 2002 Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: A secure on demand routing protocol for Ad Hoc networks. In: Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking (MobiCom 2002), pp. 12–23 (2002) INET framework for OMNET++. http://www.omnetpp.org/doc/INET/neddoc/index.html. Johnson, D.B., Maltz, D.A., Hu, Y.-C.: The dynamic source routing protocol for mobile Ad Hoc networks (DSR). draft-ietf-manet-dsr-09.txt, April 2003 Jerichow, A.: Generalisation and security improvement of mixed-mediated anonymous communications. Ph.D. Thesis, Technischen Universitat Dresden (2000) Jean-Marc, P.B.J.: Détection d’intrusions dans les réseaux Ad Hoc. SSTIC’03, 1er Symposium sur la Sécurité des Technologies de l’Information et de la Communication. Rennes, juin (2003) Kong, J., Hong, X., Gerla, M., Sanadidi, M.Y.: Comparison: ASR is a variant of ANODR. Technical report, UCLA (2005) Kong, J., Hong, X.: ANODR: ANonymous On demand routing with untraceable routes for mobile ad hoc networks. In: ACM MOBIHOC’03, pp. 291–302 (2003) Kong, J., Hong, X., Gerla, M.: An anonymous on demand routing with untraceable routes for mobile Ad Hoc networks. Technical report CSD-TR030020, Department of Computer Science, UCLA (2003) Kong, J.: Anonymous and untraceable communications in mobilewireless networks. Ph.D. Thesis, University of California, Los Angeles, June 2004 Kesdogan, D., Egner, J., Buschkes, R.: Stop-and-go MIXes providing probabilistic security in an open system. Second International Workshop on Information Hiding (IH’98), Lecture Notes in Computer Science, vol. 1525, pp. 83–98 (1998) Koblitz N. (1987). Elliptic curve cryptosystems. Math. Comput. 48: 203–209 Luh, W., Kundur, D.: Distributed privacy for visual sensor networks via markov shares. In: Proceedings of 2nd IEEE Workshop on Dependability and Security in Sensor Networks and Systems. Columbia, MD, April 2006 Lou, W., Liu, W., Fang, Y.: SPREAD: Improving network security by multipath routing. IEEE Milcom’03. Boston, MA, October 2003 Lou, W., Liu, W., Fang, Y.: SPREAD: enhancing data confidentiality in mobile ad hoc networks. In: The 23rd Conference of the IEEE Communications Society (IEEE Infocom 2004), Hong-Kong, March 2004 Liu, J., Kong, J., Hong, X., Gerla, M.: Performance evaluation of anonymous routing protocols in mobile Ad Hoc networks. In: IEEE Wireless Communications and Networking Conference (WCNC), Las Vegas, NV, USA, 3–6 April 2006 McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory. DSN Prog. Rep., Jet Prop. Lab. California Inst. Technol., Pasadena, CA, pp. 114–116 (1978) Naor, M., Pinkas, B.: Oblivious transfer and polynomial evaluation. In: Proceedings of the 31st Symposium on Theory of Computer Science (STOC), Atlanta, GA, pp. 245–254, 1–4 May 1999 Orlando, G., Paar, C.: A Scalable GF(p) Elliptic curve processor architecture for programmable hardware. In: Cryptographic Hardware and Embedded Systems CHES 2001: Third International Workshop, Paris, France, 14–16 May 2001 OMNET++. http://www.omnetpp.org/ Pfitzmann, A., Pfitzmann, B., Waidner, M.: ISDNMixes: untraceable communication with very small bandwidth overhead. In: GI/ITG Conference: Communication in Distributed Systems, pp.~451–463 (1991) Perkins, C.E., Bhagwat, P.: Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers (1994) Perkins, C., Belding-Royer, E., Das, S.: Ad Hoc on-demand distance vector (AODV) routing. RFC 3561, July 2003 Papadimitratos, P., Haas, Z.J.: Secure routing for mobile Ad Hoc networks. In: SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002). January 2002 Seys, S., Preneel, B.: ARM: Anonymous routing protocol for mobile Ad Hoc networks. In: 20th International Conference on Advanced Information Networking and Applications (AINA), Vienna, Austria, April 2006 Song, R., Korba, L., Yee, G.: AnonDSR: Efficient anonymous dynamic source routing for mobile Ad-Hoc networks. In: ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN) (2005) Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: A secure routing protocol for Ad Hoc networks. In: Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP) (2002) Sy, D., Chen, R., Bao, L.: ODAR: On-demand anonymous routing in Ad Hoc networks. Mobile Adhoc and Sensor Systems (MASS), 2006 IEEE International Conference, pp. 267–276, Vancouver, Canada, October 2006 Venkatraman, L., Agrawal, D.P.: Strategies for enhancing routing security in protocols for mobile Ad Hoc networks. In: Journal of Parallel and Distributed Computing, 63.2 (February 2003). Special issue on routing in mobile and wireless Ad Hoc networks, pp. 214–227 (2003). ISSN:0743-7315 Yang, H., Meng, X., Lu, S.: Self-organized network-layer security in mobile Ad Hoc network. In: Proceedings of the ACM Workshop on Wireless Security, pp. 11–20 (2002) Yi, S., Naldurg, P., Kravets, R.: Security-aware Ad Hoc routing protocol for wireless networks. In: The 6th World Multi-Conference on Systemics, Cybernetics and Informatics (SCI 2002) (2002) Zhu, B., Wan, Z., Kankanhalli, M.S., Bao, F., Deng, R.H.: Anonymous secure routing in mobile Ad Hoc networks. In: 29th IEEE International Conference on Local Computer Networks (LCN’04), pp. 102108, November 2004 Zhang, Y., Liu, W., Lou, W.: Anonymous communications in mobile Ad Hoc networks. In: IEEE INFOCOM (2005)