Pair-wise resistance to traffic analysis in MANETs

  • Authors:
  • Chase Gray;Jason Byrnes;Srihari Nelakuditi

  • Affiliations:
  • University of South Carolina;University of South Carolina;University of South Carolina

  • Venue:
  • ACM SIGMOBILE Mobile Computing and Communications Review
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Some of the same features that make MANETs attractive, such as mobility and self-organization, also lead to increased vulnerability to traffic analysis. Data on who is communicating with whom, how often, how much, and when is easily available to any eavesdropper within range of the wireless network. Even if the payload is encrypted, standard MANET protocols transmit enough header and routing information in the clear making traffic analysis relatively easy for attackers. But users of MANETs may want to resist traffic analysis for a variety of reasons, ranging from secrecy for government and industry to simple personal privacy for individuals. Traffic analysis is a threat to secure communication, either by identifying targets for attacks such as denial-of-service or encryption cracking, or by revealing communication relationships.