Privacy Preserving Communication in MANETs

作者: Heesook Choi , Patrick McDaniel , Thomas F. La Porta

DOI: 10.1109/SAHCN.2007.4292835

关键词:

摘要: Mobile ad hoc networks often support sensitive applications. These applications may require that users' identity, location, and correspondents be kept secret. This is a challenge in MANET because of the cooperative nature network broadcast communication media. In this paper, we propose privacy preserving system (PPCS) which provides comprehensive solution to anonymize end- points, keep location identifier node unlinkable, mask existence flows. We present an analysis security PPCS against passive internal attackers, provide qualitative discussion on its strength external characterize performance trade-offs. The simulation results demonstrate has only 3% lower packet delivery ratio than existing multi-path routing protocols, while effectively providing service MANETs.

参考文章(31)
Tom Leighton, Silvio Micali, Secret-Key Agreement without Public-Key Cryptography international cryptology conference. pp. 456- 479 ,(1993) , 10.1007/3-540-48329-2_39
S.-J. Lee, M. Gerla, Split multipath routing with maximally disjoint paths in ad hoc networks international conference on communications. ,vol. 10, pp. 3201- 3205 ,(2001) , 10.1109/ICC.2001.937262
Matt Blaze, John Ioannidis, Angelos D. Keromytis, Tal Malkin, Avi Rubin, WAR: Wireless Anonymous Routing Security Protocols. pp. 218- 232 ,(2005) , 10.1007/11542322_27
Adam Back, Ulf Möller, Anton Stiglic, Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems information hiding. pp. 245- 257 ,(2001) , 10.1007/3-540-45496-9_18
Andrei Serjantov, Peter Sewell, Passive Attack Analysis for Connection-Based Anonymity Systems european symposium on research in computer security. pp. 116- 131 ,(2003) , 10.1007/978-3-540-39650-5_7
Roger Dingledine, Nick Mathewson, Paul Syverson, Tor: the second-generation onion router usenix security symposium. pp. 21- 21 ,(2004) , 10.21236/ADA465464
R. Canetti, H. Krawczyk, M. Bellare, HMAC: Keyed-Hashing for Message Authentication RFC. ,vol. 2104, pp. 1- 11 ,(1997)
Brian N. Levine, Michael K. Reiter, Chenxi Wang, Matthew Wright, Timing Attacks in Low-Latency Mix Systems financial cryptography. ,vol. 3110, pp. 251- 265 ,(2004) , 10.1007/978-3-540-27809-2_25
Yanchao Zhang, Wei Liu, Wenjing Lou, Anonymous communications in mobile ad hoc networks international conference on computer communications. ,vol. 3, pp. 1940- 1951 ,(2005) , 10.1109/INFCOM.2005.1498472
Michael K. Reiter, Aviel D. Rubin, Crowds: anonymity for Web transactions ACM Transactions on Information and System Security. ,vol. 1, pp. 66- 92 ,(1998) , 10.1145/290163.290168