Onion Routing in Deterministic Delay Tolerant Networks

  • Adrian Antunez-Veas
  • Guillermo Navarro-ArribasEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9482)


Deterministic DTNs are networks where the behavior is known in advance or where a repetitive action occurs over time like in public transportation networks. This work proposes the application of an onion routing approach to deterministic DTNs to achieve anonymous communications. We show how the prior stage of path selection in onion routing can be achieved using the information provided by deterministic networks.


Malicious Node Path Selection Delay Tolerant Network Dynamic Graph Anonymous Communication 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.



Support by Spanish MINECO project TIN2014–55243-P, and Catalan AGAUR project 2014-SGR-691, is acknowledged.


  1. 1.
    Bhutta, N., Ansa, G., Johnson, E., Ahmad, N., Alsiyabi, M., Cruickshank, H.: Security analysis for delay/disruption tolerant satellite and sensor networks. In: International Workshop on Satellite and Space Communications, IWSSC 2009, pp. 385–389 (2009)Google Scholar
  2. 2.
    Cardei, I., Liu, C., Wu, J., Yuan, Q.: DTN routing with probabilistic trajectory prediction. In: Li, Y., Huynh, D.T., Das, S.K., Du, D.-Z. (eds.) WASA 2008. LNCS, vol. 5258, pp. 40–51. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  3. 3.
    Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: USENIX Security Symposium. USENIX Association (2004)Google Scholar
  4. 4.
    DLR: SUMO - Simulation of Urban MObility, Insitute if Transportation Systems, Deutsches Zentrum für Luft- und Raumfahrt (DLR)Google Scholar
  5. 5.
    Evans, N.S., Dingledine, R., Grothoff, C.: A practical congestion attack on tor using long paths. In: USENIX Security Symposium, pp. 33–50 (2009)Google Scholar
  6. 6.
    Farrell, S., Cahill, V.: Delay- and Disruption-Tolerant Networking. Artech House, Norwood (2006)Google Scholar
  7. 7.
    Feamster, N., Dingledine, R.: Location diversity in anonymity networks. In: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, pp. 66–76. ACM (2004)Google Scholar
  8. 8.
    Goldschlag, D., Reed, M., Syverson, P.: Hiding routing information. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 137–150. Springer, Heidelberg (1996)CrossRefGoogle Scholar
  9. 9.
    Hay, D., Giaccone, P.: Optimal routing and scheduling for deterministic delay tolerant networks. In: Sixth International Conference on Wireless On-Demand Network Systems and Services, WONS 2009, pp. 27–34. IEEE (2009)Google Scholar
  10. 10.
    Hopper, N., Vasserman, E.Y., Chan-Tin, E.: How much anonymity does network latency leak? ACM Trans. Inf. Syst. Secur. 13(2), 13:1–13:28 (2010)CrossRefGoogle Scholar
  11. 11.
    Jain, S., Fall, K., Patra, R.: Routing in a delay tolerant network, vol. 34. ACM (2004)Google Scholar
  12. 12.
    OSM: JOSM, OpenStreetMap (OSM).
  13. 13.
    Nsnam: NS-3 webpage.
  14. 14.
    Raj, C., Upadhayaya, U., Makwana, T., Mahida, P.: Simulation of vanet using NS-3 and SUMO. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 4, 563–569 (2014)Google Scholar
  15. 15.
    Reed, M.G., Syverson, P.F., Goldschlag, D.M.: Anonymous connections and onion routing. IEEE J. Select. Areas Commun. 16(4), 482–494 (1998)CrossRefGoogle Scholar
  16. 16.
    Shi, C., Luo, X., Traynor, P., Ammar, M.H., Zegura, E.W.: Arden: anonymous networking in delay tolerant networks. Ad Hoc Netw. 10(6), 918–930 (2012)CrossRefGoogle Scholar
  17. 17.
  18. 18.
    Vakde, G., Bibikar, R., Le, Z., Wright, M.: Enpassant: anonymous routing for disruption-tolerant networks with applications in assistive environments. Secur. Commun. Netw. 4(11), 1243–1256 (2011)CrossRefGoogle Scholar
  19. 19.
    Zhou, D.: DTN Bundle Protocol.

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  • Adrian Antunez-Veas
    • 1
  • Guillermo Navarro-Arribas
    • 1
    Email author
  1. 1.Department of Information and Communications EngineeringUniversitat Autònoma de Barcelona (UAB)CerdanyolaSpain

Personalised recommendations