Abstract
Mobile ad hoc network has been extensively studied in recent years due to its potential applications in civilian and military environments. Cooperative caching, which allows the sharing and coordination of cached data among multiple nodes, could be employed to improve data accessibility and reduce data access cost in mobile ad hoc networks. In this paper, we give anonymity requirements for cooperative cache-based data access in mobile ad hoc networks and present two efficient anonymous data access schemes based on onion message and pseudonym-based encryption, respectively. The proposed schemes can not only protect confidentiality of sensitive cache data but can also protect privacy of nodes and routes.
1. Introduction
A mobile adhoc network (MANET) is a self-configuring temporary network of mobile devices connected by wireless links without infrastructure support. The benefits of flexible routing, global connectivity and a highly adaptive potential make MANETs suitable for a wide range of applications in both military and commercial environments, such as battlefields, disaster relief operations, personal area networking, mobile information sharing, and vehicular networks.
Similar to the wired network, security requirements for MANETs include availability, confidentiality, integrity, authentication, nonrepudiation. Compared to the wired network, MANET is more vulnerable to security attacks due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and so forth [1].
Traffic analysis is one of the most serious security attacks in MANETs due to the broadcast nature of the wireless medium. In this attack, adversaries can obtain sensitive information about the applications even without revealing the contents of the messages just by observing network traffic pattern. For example, an attacker can identify the communicating parties and their positions by tracing and analyzing the network traffic patterns. This may lead to severe threats in security-sensitive applications. For instance, in a battle field the enemy can physically destroy the important mobile nodes if they can identify and locate such nodes by traffic analysis. Ideally, a node should be able to keep its identity, its location and its correspondents private, that is, remain anonymous. Simple traffic padding approach by generating dummy traffic into the network does not aim to hide the identifiers of communicating nodes and so cannot completely prevent traffic analysis.
In order to thwart traffic analysis attack, anonymous mobile ad hoc routing protocols are developed and have been attracting the attention of more and more researchers in recent years. The most current anonymous routing protocols for MANETs assume that mobile users share pairwise secrets before they start an anonymous communication session. This assumption is impractical for many ad hoc scenarios where pairwise shared keys are difficult to be set up in advance.
Song et al. [2] presented an anonymous dynamic source routing protocol for MANETs. The protocol employs anonymous onion routing between the source and destination, and each intermediate node owns a shared session key with the source and destination nodes when the protocol is completed. Zhang et al. [3] proposed an anonymous on-demand routing protocol based on identity-based encryption [4] for MANETs. In their approach, nodes use pseudonyms instead of their real identifiers, and each node can dynamically changes its pseudonyms. Each node self-generates a set of pseudonyms and submit them to the trusted authority, and the trusted authority generates corresponding private keys and sends them back to the node. The drawback of Zhang et al.'s approach is the underlying anonymous communications are not blind to the trusted private key generator (PKG). Later, Huang [5] presented an anonymous communication system for MANETs based on pseudonym-based cryptography without trusted PKG. Sheklabadi and Berenjkoub [6] proposed an anonymous version of authenticated routing for ad hoc networks (ARAN), which can provide a variety of anonymous functionalities such as identity privacy, location privacy, and route anonymity together with security features of ARAN. However, the proposed protocol is based on a impractical assumption that there is a shared secret between the source and the destination.
Although routing is an important issue in MANETs, other issues such as data access are also very important since the ultimate goal of using MANETs is to provide data access to mobile nodes. Caching techniques are an efficient way for increasing the performance in data communication, which has been widely used in different fields such as CPU design, multiprocessor, memory architecture, or router design. Internet uses cache placement and replacement in proxy servers and cooperative caching architecture to reduce the network traffic and average latency of data query significantly [7]. As mobile nodes in ad hoc networks may have similar tasks and share common interest, cooperative caching, which allows the sharing and coordination of cached data among multiple nodes, can be used to reduce the bandwidth and power consumption. However, cooperative caching techniques designed for wired networks may not be applied directly to MANETs due to their dynamic topology and constrained resources (i.e., bandwidth, battery power, and computational capacity).
Ting and Chang [8] proposed a cooperative caching scheme for wireless ad hoc networks called GroupCaching, which allows each mobile host and its 1-hop neighbors form a group, and the caching status is exchanged and maintained periodically in a group. Yin and Cao [9] proposed three cooperative caching schemes for ad hoc networks, called CachePath, CacheData, and HybridCache, respectively. Zhao et al. [10] proposed a novel asymmetric cooperative cache approach, where the data requests are transmitted to the cache layer on every node, but the data replies are only transmitted to the cache layer at the intermediate nodes that need to cache the data. Recently, Wu and Cao [11] proposed a Voronoi Diagram-based cooperative cache discovery approach to reduce data access cost by limiting the cache information update and query within a single Voronoi Region. Currently existing cooperative caching schemes in MANETs have not yet considered the problem of anonymity.
In this paper, we give anonymity requirements for cooperative cache based data access in MANETs, and present two efficient anonymous cooperative cache based data access schemes based on onion message and pseudonym-based encryption, respectively. The proposed schemes cannot only protect confidentiality of sensitive cache data but can also protect privacy of nodes and routes.
The rest of this paper is organized as follows. Some necessary background knowledge about bilinear pairings and pseudonym-based encryption are introduced in Section 2. The anonymity requirements and system model of anonymous cooperative cache based data access in MANETs are explained in Section 3. Our proposed anonymous cooperative cache based data access schemes in MANETs based on onion message and pseudonym-based encryption are described in Sections 4 and 5, respectively. Anonymity and security analysis of the two proposed cooperative cache based data access schemes in MANETs are presented in Section 6. We conclude our work in Section 7.
2. Preliminary Works
We first introduce some notations. If
2.1. Bilinear Pairings and the Bilinear Diffie-Hellman Assumption
Let Bilinearity. For Nondegeneracy. The map does not send all pairs in Computability. There is an efficient algorithm to compute
The bilinear group generator
Given a bilinear group
We say that the BDH assumption holds in the bilinear group
2.2. Pseudonym-Based Encryption Scheme
Huang proposed a pseudonym-based encryption (PBE) scheme without trusted PKG to provide anonymous communication [5], which is described as follows.
Setup. The PKG generates and publish system parameters as Extract. To self-generate a pseudonym and corresponding private key, an anonymous user first chooses Encrypt. To encrypt the plaintext Decrypt. To decrypt C, the intended receiver A first computes
Huang [5] proved that the above scheme is semantically secure pseudonym based encryption in the random oracle model assuming BDH is hard in groups generated by ℊ.
3. System Model
The system model for our proposed anonymous cooperative cache based data access schemes in MANETs is illustrated as Figure 1. There are n intermediate nodes between the source node and the destination node along the routing path. We denote the source node, nodes en route, and the destination node as S,

Route from source node to destination node.
The proposed anonymous cooperative cache based data access schemes in MANETs consist of the following four steps.
Route Request Phase. The source node first constructs and initializes the route request message packet (RREQ) and broadcasts to search for the destination node who has a copy of required data cache. Route Reply Phase. The destination node constructs and sends a route reply packet (RREP) back to the source node along the path found by the first step. Data Request Phase. The source node sends data cache request message packet (DREQ) to the destination node. Anonymous Data Transmission Phase. The destination node transfers the requested data cache back to the source node.
We define an internal adversary as a node that is compromised and on the routing path. An external adversary is a compromised node not on the path, or an external node not directly participating in the MANET, that is, it only eavesdrops on traffic between nodes.
We make the following two assumptions for our anonymous cooperative cache-based data access schemes in MANETs.
All wireless links are symmetric, which means that if node A is in transmission range of some node B, so B is in transmission range of A as well. Adversaries have unbounded eavesdropping capability but bounded computing and node intrusion capabilities.
To resist outsider attack, our anonymous cooperative cache based data access schemes should prevent outsider adversary from learning the identity of source node and destination node, and intermediate nodes en route. To resist insider attack, our anonymous cooperative cache based data access schemes should prevent insider adversary from determining whether another node is the source or the destination, or an intermediate node en route of a particular message. So, we consider the following three types of anonymity for our anonymous cooperative cache based data access schemes in MANETs.
Anonymity of source and destination nodes. Both the source and destination nodes is anonymous to others, and no one knows the location of the source node or destination node. Anonymity of intermediate nodes. Nobody knows the real identities and location of intermediate nodes, even the node en route cannot know the real identities and locations of other nodes. Anonymity of the route. Adversaries cannot trace a packet flow back to its source or the destinations. Nobody knows the real routing path between the source and destination nodes. For adversaries not in the route, they have no information on any part of the route.
For convenience of presentation, we introduce the notations that will be used in our proposed anonymous cooperative cache based data access schemes in notations section.
4. Anonymous Data Access Scheme Based on Onion Packet
4.1. Route Request Phase
The route request phase allows a source node S to discover and establish a routing path to a destination node D through a number of intermediate nodes. To keep communication anonymity, none of the intermediate nodes participating in this phase should discover the identities of S and D. The source node S constructs a route request message packet with the following format and broadcasts to all its neighboring nodes:
When a node Check whether the packet has already been received by using the fields If the packet has not been received, then
If the node has the requested cache data (i.e., node If node The field If the packet has been received, then
If Otherwise, node
4.2. Route Reply Phase
The destination node D first chooses a random symmetric key
For every intermediate node
4.3. Data Request Phase
The source node S generates and broadcasts the data cache request packet with the following format:
4.4. Anonymous Data Transmission Phase
The process of data cache transmission is similar with the process of the data cache request. The difference is that the route path information are included in the process of data cache request, while the cache-related data are included in the process of data cache transmission.
Every node has to broadcast the request packets to the entire MANET to get the cache data in our proposed scheme. Recently, Wu and Cao [11] proposed a Voronoi Diagram based cooperative cache discovery approach to reduce data access cost by limiting the cache information update and query within a single Voronoi Region. We can further extend our anonymous data access scheme according to the following idea: for each type of cache, all nodes send the route request packets. Once nodes receive route reply packets, they compute the length of hops for every received packet and choose the shortest two. If the two shortest paths are equal, then we assure that the node is the edge node of the Voronoi Region. So for that type of cache, the node will stop broadcasting the request packet to these nodes.
5. Anonymous Data Access Scheme Based on PBE
5.1. Route Request Phase
The source node S cannot find some data in the local cache, it asks for its neighbor nodes by broadcasting a route request message packet with the following format:
Once the intermediate node
5.2. Route Response Phase
Suppose that the node D finds the cache copy of the requested data according to its
5.3. Data Request Phase
After receiving the route reply packet, the source node S broadcasts the data request message packet with following format:
5.4. Anonymous Data Transmission Phase
The destination node D gets the requested data by searching in its route table against keywords (
6. Analysis on the Proposed Anonymous Data Access Schemes
In the context of anonymity analysis, we assume that adversaries may be en route as well as out of the route and they are interested in the privacy information about the route and nodes en route.
We use pseudonyms to identify the nodes without unveiling the real identities and locations of all the nodes, thus the privacy of locations and identities of the nodes are well protected. In our anonymous data access scheme based on onion packet, the information of route is encrypted, the whole routing path are only known by the source node and destination node. The path consists of pseudonyms of each node, intermediate nodes may only know the number of hops, the proposed anonymous data access scheme based on onion packet provides weak anonymity. In our anonymous data access scheme based on PBE, the information of the routing path is only recorded separately in the route table of each node with pseudonyms. Even adversaries en route can get nothing about the route except pseudonyms of its previous hop and next hop. The pseudonym of the source node used for encrypting the data is transferred along the path, however, it uses another pseudonym to participate in the route path. So even the next hop of the source node knows nothing about the fact it is the source node, thus our proposed anonymous data access scheme based on PBE provides strong anonymity.
In our proposed two anonymous data access schemes, passive eavesdropper can only catch packets encrypted by a public key or a session key. For active adversaries who may pretend to be the destination node to send fake route reply packet to the requested node and control some nodes along the routing path, they could only get the pseudonyms of the previous hop and next hop and the encrypted data packet.
In our proposed anonymous data access scheme based on onion packet, DOS attacker cannot control which node they get the cache data from, and they do not know the true identity of the cache node. In our proposed anonymous data access scheme based on PBE, the node has to be authenticated before it requests the cache data. Thus our proposed anonymous data access schemes can resist DOS attack.
7. Conclusion
Secure anonymity cooperative caching is one of the important task in mobile ad hoc networks in certain privacy vital environments. In this paper, we give anonymity requirements for cooperative cache-based data access in mobile ad hoc networks and present two efficient anonymous data access scheme based on onion message and pseudonym-based encryption, respectively. The proposed schemes cannot only protect the privacy of nodes and routes but can also resist both passive and active attacks.
Footnotes
Notations
Acknowledgment
This research is jointly funded by the National Natural Science Foundation of China (Grant no. 61173189) and the Guangdong Province Information Security Key Laboratory Project.
