Using camouflaging mobility to protect privacy in mobile ad hoc networks

The open nature of wireless medium has left wireless communications vulnerable to various privacy attacks. Much research work has been proposed to protect the identity anonymity of communicating parties, the anonymity of network routes and the location privacy of the message source and destination....

Full description

Saved in:
Bibliographic Details
Published inSecurity and communication networks Vol. 2; no. 6; pp. 580 - 594
Main Authors Tang, Lei, Hong, Xiaoyan, Vrbsky, Susan
Format Journal Article
LanguageEnglish
Published Chichester, UK John Wiley & Sons, Ltd 01.11.2009
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:The open nature of wireless medium has left wireless communications vulnerable to various privacy attacks. Much research work has been proposed to protect the identity anonymity of communicating parties, the anonymity of network routes and the location privacy of the message source and destination. However, with the advent of new radio identification and localization techniques, more advanced privacy attacks are possible. We describe a new privacy attack in which the adversary tries to infer the itineraries of the nodes in the network. To protect itinerary privacy, we design an algorithm, called $\Delta$‐camouflaging mobility algorithm, which changes the original motion segments of a node into $\Delta$‐shaped camouflaging paths. Itinerary privacy, correspondent privacy, and route privacy are closely related so we propose a comprehensive anonymous routing scheme, called MARS, to protect these privacy goals. MARS exploits camouflaging mobility to protect itinerary privacy and uses motion pseudonyms generated from the camouflaging mobility to protect correspondent privacy and route privacy without using cryptography. Our analysis results show that $\Delta$‐camouflaging mobility algorithm is cost‐effective, which can significantly reduce the itinerary exposure probability at a small cost of extra travel distance. Moreover, our network simulation results illustrated that MARS anonymous routing scheme and $\Delta$‐camouflaging mobility algorithm did not reduce network layer performance. Copyright © 2009 John Wiley & Sons, Ltd.
Bibliography:ArticleID:SEC101
Part of this paper was presented in the IEEE WoWMoM 08, Workshop on Security, Privacy, and Authentication in Wireless Networks, Newport Beach, CA, 23-27 June 2008.
ark:/67375/WNG-Z862C399-C
istex:FD32097E58A0199F59807F77DF40CE156A0E79A3
Part of this paper was presented in the IEEE WoWMoM 08, Workshop on Security, Privacy, and Authentication in Wireless Networks, Newport Beach, CA, 23–27 June 2008.
ObjectType-Article-2
SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 23
ISSN:1939-0114
1939-0122
1939-0122
DOI:10.1002/sec.101