The dining cryptographers problem: unconditional sender and recipient untraceability
Journal of Cryptology
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Anonymity, unobservability, and pseudeonymity — a proposal for terminology
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
A Survey of Secure Wireless Ad Hoc Routing
IEEE Security and Privacy
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
A3RP: Anonymous and Authenticated Ad Hoc Routing Protocol
ISA '08 Proceedings of the 2008 International Conference on Information Security and Assurance (isa 2008)
ARM: anonymous routing protocol for mobile ad hoc networks
International Journal of Wireless and Mobile Computing
An Efficient Anonymous Routing Protocol for Mobile Ad Hoc Networks
IAS '09 Proceedings of the 2009 Fifth International Conference on Information Assurance and Security - Volume 02
Privacy and Security on Anonymous Routing Protocols in MANET
ICCEE '09 Proceedings of the 2009 Second International Conference on Computer and Electrical Engineering - Volume 02
SPM: source privacy for mobile ad hoc networks
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network algorithms, systems, and applications
Anonymous Multipath Routing Protocol Based on Secret Sharing in Mobile Ad Hoc Networks
ICMTMA '10 Proceedings of the 2010 International Conference on Measuring Technology and Mechatronics Automation - Volume 01
MASK: anonymous on-demand routing in mobile ad hoc networks
IEEE Transactions on Wireless Communications
iTasks: executable specifications of interactive work flow systems for the web
ICFP '07 Proceedings of the 12th ACM SIGPLAN international conference on Functional programming
Secure web applications via automatic partitioning
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles
Declarative Ajax and client side evaluation of workflows using iTasks
Proceedings of the 10th international ACM SIGPLAN conference on Principles and practice of declarative programming
An Introduction to iTasks: Defining Interactive Work Flows for the Web
Central European Functional Programming School
Building secure web applications with automatic partitioning
Communications of the ACM - Inspiring Women in Computing
Secure compilation of a multi-tier web language
Proceedings of the 4th international workshop on Types in language design and implementation
CC '09 Proceedings of the 18th International Conference on Compiler Construction: Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2009
Hop, a Fast Server for the Diffuse Web
COORDINATION '09 Proceedings of the 11th International Conference on Coordination Models and Languages
Ripley: automatically securing web 2.0 applications through replicated execution
Proceedings of the 16th ACM conference on Computer and communications security
Towards reasoning for web applications: an operational semantics for Hop
APLWACA '10 Proceedings of the 2010 Workshop on Analysis and Programming Languages for Web Applications and Cloud Applications
Dynamically partitioning applications between weak devices and clouds
Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond
An iTask case study: a conference management system
AFP'08 Proceedings of the 6th international conference on Advanced functional programming
A programming language approach for context-aware mashups
Proceedings of the 3rd and 4th International Workshop on Web APIs and Services Mashups
Plato: a compiler for interactive web forms
PADL'11 Proceedings of the 13th international conference on Practical aspects of declarative languages
Hi-index | 0.00 |
Offering secure and anonymous communications in mobile ad hoc networking environments is essential to achieve confidence and privacy, thus promoting widespread adoption of this kind of networks. In addition, some minimum performance levels must be achieved for any solution to be practical and become widely adopted. In this paper, we propose and implement HOP, a novel solution based on cryptographic Host Identity Protocol (HIP) that offers security and user-level anonymity in MANET environments while maintaining good performance levels. In particular, we introduce enhancements to the authentication process to achieve Host Identity Tag (HIT) relationship anonymity, along with source/destination HIT anonymity when combined with multihoming. Afterward we detail how we integrate our improved version of HIP with the OLSR routing protocol to achieve efficient support for pseudonyms. We implemented our proposal in an experimental testbed, and the results obtained show that performance levels achieved are quite good, and that the integration with OLSR is achieved with a low overhead.