Elements of information theory
Elements of information theory
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots
SDAR: A Secure Distributed Anonymous Routing Protocol for Wireless and Mobile Ad Hoc Networks
LCN '04 Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks
AnonDSR: efficient anonymous dynamic source routing for mobile ad-hoc networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
ARM: Anonymous Routing Protocol for Mobile Ad hoc Networks
AINA '06 Proceedings of the 20th International Conference on Advanced Information Networking and Applications - Volume 02
Traffic analysis-based unlinkability measure for IEEE 802.11b-based communication systems
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Anonymous Routing in MANET Using Random Identifiers
ICN '07 Proceedings of the Sixth International Conference on Networking
An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
WAR: wireless anonymous routing
Proceedings of the 11th international conference on Security Protocols
MASK: anonymous on-demand routing in mobile ad hoc networks
IEEE Transactions on Wireless Communications
Unlinkability Measure for IEEE 802.11 Based MANETs
IEEE Transactions on Wireless Communications
Hi-index | 0.00 |
Anonymous MANET routing relies on techniques such as re-encryption on each hop to hide end-to-end communication relations. However, passive signal detectors and traffic analyzers can still retrieve sensitive information from PHY and MAC layers through statistical traffic analysis. In this paper, we propose a statistical traffic pattern discovery (STPD) system. STPD intends to find out the sources and destinations of captured packets and discover the end-to-end communication relations. The proposed approach does not require analyzers to be actively involved in MANET transmissions or to decrypt the traffic. We present theoretical models as well as extensive simulations to demonstrate our solutions.