Using camouflaging mobility to protect privacy in mobile ad hoc networks

1Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The open nature of wireless medium has left wireless communications vulnerable to various privacy attacks. Much research work has been proposed to protect the identity anonymity of communicating parties, the anonymity of network routes and the location privacy of the message source and destination. However, with the advent of new radio identification and localization techniques, more advanced privacy attacks are possible. We describe a new privacy attack in which the adversary tries to infer the itineraries of the nodes in the network. To protect itinerary privacy, we design an algorithm, called δ-camouflaging mobility algorithm, which changes the original motion segments of a node into δ-shaped camouflaging paths. Itinerary privacy, correspondent privacy, and route privacy are closely related so we propose a comprehensive anonymous routing scheme, called MARS, to protect the seprivacy goals. MARS exploits camouflaging mobility to protect itinerary privacy and uses motion pseudonyms generated from the camouflaging mobility to protect correspondent privacy and route privacy without using cryptography. Our analysis results show that δ-camouflaging mobility algorithm is cost-effective, which can significantly reduce the itinerary exposure probability at a small cost of extra travel distance. Moreover, our network simulation results illustrated that MARS anonymous routing scheme and δ-camouflaging mobility algorithm did not reduce network layer performance. © 2009 John Wiley & Sons, Ltd.

References Powered by Scopus

Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms

3179Citations
N/AReaders
Get full text

An Algorithm for Tracking Multiple Targets

2573Citations
N/AReaders
Get full text

Markov Localization for Mobile Robots in Dynamic Environments

715Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Location-preserved contention-based routing in vehicular ad hoc networks

2Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Tang, L., Hong, X., & Vrbsky, S. (2009). Using camouflaging mobility to protect privacy in mobile ad hoc networks. Security and Communication Networks, 2(6), 580–594. https://doi.org/10.1002/sec.101

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 3

60%

Professor / Associate Prof. 1

20%

Researcher 1

20%

Readers' Discipline

Tooltip

Computer Science 3

50%

Chemistry 1

17%

Engineering 1

17%

Medicine and Dentistry 1

17%

Save time finding and organizing research with Mendeley

Sign up for free