Open Access Open Access  Restricted Access Subscription or Fee Access

An Efficient Method for Preventing Mobile Tracing Using Motion-Mix over Mobile Wireless Nodes

Dr. K. Selvakumar, R. Saminathan, U. Padmavathi

Abstract


Providing security and privacy in mobile ad hoc networks has been a major issue over the last few years. It is more challenging due to advances in techniques of eavesdropping, locating and fingerprinting wireless transmissions. In particular, the mobile ad hoc networks are vulnerable to passive attacks that threaten the privacy of communications. In this paper, we first investigate the emerging threat of venue privacy attacks (VPAs) to trace mobile wireless nodes. We then propose motion-mix as the solution. The motion-mix is a geographic area in which the relation between nodes is hidden. The motion-mix provides protection at all the layers of the protocol stack. The necessary conditions to implement motion-mix are then studied. We further verify the effectiveness of motion-mix against venue privacy attack using a simulated network security model. We prove that the probability of security breach is negligible with respect to the polynomial-bounded network scale. This notion is conforming to the existing security notions in computational cryptography, where the polynomial-bounded metric is key length.

Keywords


Anonymity, Motion-Mix, VPA, MANET, Mobile tracing, Security.

Full Text:

PDF

References


C.K. Toh, “Ad Hoc Mobile Wireless Networks: Protocols and Systems”, Prentice Hall PTR, 2001.

Teerawat Issariyakul, Ekram Hossain, “Introduction to Network Simulator NS2”, Springer, 2009

Aad, C. Castelluccia, and J.-P. Huubaux, “Packet coding for strong anonymity in ad hoc networks,” in Proc. SecureComm Workshops, 2006, pp. 1–10.

C. Bettstetter, “Mobility modeling in wireless networks: Categorization, smooth movement, and border effects,” ACM Mobile Comput. Commun. Rev., vol. 5, no. 3, pp. 55–67, 2001.

M. Gruteser and D. Grunwald, “Anonymous usage of location-based services through spatial and temporal cloaking,” in Proc. MobiSys, 2003, pp. 31–42.

Y.-C. Hu and H. J. Wang, “A framework for location privacy in wireless networks,” in Proc. ACM SIGCOMM Asia Workshop, 2005, pp. 1–8.

K. B. Rasmussen and S. Capkun, “Implications of radio fingerprinting on the security of sensor networks,” in Proc. IEEE SecureComm, Nice, France, Sep. 2007, pp. 331–340.

R. Song, L. Korba, and G. Yee, “AnonDSR: Efficient anonymous dynamic source routing for mobile ad-hoc networks,” in Proc. ACM Workshop SASN, 2005, pp. 33–42.

L. Sweeney, “k-anonymity: A model for protecting privacy,” Int. J. Uncertainty, Fuzziness Knowledge-Based Syst., vol. 10, no. 5, pp. 557–570, 2002.

L. Yang, M. Jakobsson, and S. Wetzel, “Discount anonymous on demand routing for mobile ad hoc networks,” in Proc. SecureComm, 2006, pp. 1–10.

Y. Zhang, W. Liu, and W. Lou, “Anonymous communications in mobile ad hoc networks,” in Proc. IEEE INFOCOM, 2005, pp. 1940–1951.

J. Deng, R. Han, and S. Mishra, “Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks,” in Proc. IEEE Int. Conf. DSN, 2004, pp. 594–603.

C. Ozturk, Y. Zhang, and W. Trappe, ”Source-location privacy in energy-constrained sensor network routing,” in Proc. ACM SASN, 2004, pp. 88–93.

J.Kong, X.Hong, “ANODR: Anonymous on demand routing with untraceable routes for mobile ad hoc networks”, in Proc. ACM MOBIHOC, 2003,pp. 291-302.

X. Lin, R. Lu, H.Zhu, P.-H. Ho, X.S. Shen, and Z.Cao, “ASRPAKE: An anonymous secure routing protocol with authenticated key exchange for wireless ad hoc networks,” in Proc. IEEE ICC, Jun. 2007, pp.4646-4651.

A. Boukerche, K. EI-Khatib, L. Xu, and L. Korba, “SDAR: A secure distributed anonymous routing protocol for wireless and mobile ad hoc networks,” in Proc. 29th IEEE Int. Conf. LCN, 2004, pp. 618 – 624.

K. Fall, “A delay-tolerant network architecture for challenged internets,” in Proc. ACM SIGCOMM, 2003, pp.27-34.

L. Huang, K. Matsuura, H. Yamane, and K. Sezaki, “ Enhancing wireless location privacy using silent period,” in Proc. IEEE WCNC, 2005, pp. 1187-1192.

A.R. Beresford and F. Stajano, “Mix zones: User Privacy in location-aware services,” in Proc. Pervasive Compt. Commun. Security (PerSec), 2004, pp. 127-131.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.