Skip to main content

Onion Routing in Deterministic Delay Tolerant Networks

  • Conference paper
  • First Online:
Foundations and Practice of Security (FPS 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9482))

Included in the following conference series:

Abstract

Deterministic DTNs are networks where the behavior is known in advance or where a repetitive action occurs over time like in public transportation networks. This work proposes the application of an onion routing approach to deterministic DTNs to achieve anonymous communications. We show how the prior stage of path selection in onion routing can be achieved using the information provided by deterministic networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bhutta, N., Ansa, G., Johnson, E., Ahmad, N., Alsiyabi, M., Cruickshank, H.: Security analysis for delay/disruption tolerant satellite and sensor networks. In: International Workshop on Satellite and Space Communications, IWSSC 2009, pp. 385–389 (2009)

    Google Scholar 

  2. Cardei, I., Liu, C., Wu, J., Yuan, Q.: DTN routing with probabilistic trajectory prediction. In: Li, Y., Huynh, D.T., Das, S.K., Du, D.-Z. (eds.) WASA 2008. LNCS, vol. 5258, pp. 40–51. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  3. Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: USENIX Security Symposium. USENIX Association (2004)

    Google Scholar 

  4. DLR: SUMO - Simulation of Urban MObility, Insitute if Transportation Systems, Deutsches Zentrum für Luft- und Raumfahrt (DLR)

    Google Scholar 

  5. Evans, N.S., Dingledine, R., Grothoff, C.: A practical congestion attack on tor using long paths. In: USENIX Security Symposium, pp. 33–50 (2009)

    Google Scholar 

  6. Farrell, S., Cahill, V.: Delay- and Disruption-Tolerant Networking. Artech House, Norwood (2006)

    Google Scholar 

  7. Feamster, N., Dingledine, R.: Location diversity in anonymity networks. In: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, pp. 66–76. ACM (2004)

    Google Scholar 

  8. Goldschlag, D., Reed, M., Syverson, P.: Hiding routing information. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 137–150. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  9. Hay, D., Giaccone, P.: Optimal routing and scheduling for deterministic delay tolerant networks. In: Sixth International Conference on Wireless On-Demand Network Systems and Services, WONS 2009, pp. 27–34. IEEE (2009)

    Google Scholar 

  10. Hopper, N., Vasserman, E.Y., Chan-Tin, E.: How much anonymity does network latency leak? ACM Trans. Inf. Syst. Secur. 13(2), 13:1–13:28 (2010)

    Article  Google Scholar 

  11. Jain, S., Fall, K., Patra, R.: Routing in a delay tolerant network, vol. 34. ACM (2004)

    Google Scholar 

  12. OSM: JOSM, OpenStreetMap (OSM). https://josm.openstreetmap.de

  13. Nsnam: NS-3 webpage. https://www.nsnam.org

  14. Raj, C., Upadhayaya, U., Makwana, T., Mahida, P.: Simulation of vanet using NS-3 and SUMO. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 4, 563–569 (2014)

    Google Scholar 

  15. Reed, M.G., Syverson, P.F., Goldschlag, D.M.: Anonymous connections and onion routing. IEEE J. Select. Areas Commun. 16(4), 482–494 (1998)

    Article  Google Scholar 

  16. Shi, C., Luo, X., Traynor, P., Ammar, M.H., Zegura, E.W.: Arden: anonymous networking in delay tolerant networks. Ad Hoc Netw. 10(6), 918–930 (2012)

    Article  Google Scholar 

  17. Tor Project. https://www.torproject.org/

  18. Vakde, G., Bibikar, R., Le, Z., Wright, M.: Enpassant: anonymous routing for disruption-tolerant networks with applications in assistive environments. Secur. Commun. Netw. 4(11), 1243–1256 (2011)

    Article  Google Scholar 

  19. Zhou, D.: DTN Bundle Protocol. https://www.nsnam.org/wiki/Current_Development

Download references

Acknowledgments

Support by Spanish MINECO project TIN2014–55243-P, and Catalan AGAUR project 2014-SGR-691, is acknowledged.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guillermo Navarro-Arribas .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Antunez-Veas, A., Navarro-Arribas, G. (2016). Onion Routing in Deterministic Delay Tolerant Networks. In: Garcia-Alfaro, J., Kranakis, E., Bonfante, G. (eds) Foundations and Practice of Security. FPS 2015. Lecture Notes in Computer Science(), vol 9482. Springer, Cham. https://doi.org/10.1007/978-3-319-30303-1_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-30303-1_21

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-30302-4

  • Online ISBN: 978-3-319-30303-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics