This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
An Analysis Study on Zone-Based Anonymous Communication in Mobile Ad Hoc Networks
October-December 2007 (vol. 4 no. 4)
pp. 252-265
A zone-based anonymous positioning routing protocol for ad hoc networks, enabling anonymity of both source and destination, is proposed and analyzed. According to the proposed algorithm, a source sends data to an anonymity zone, where the destination node and a number of other nodes are located. The data is then flooded within the anonymity zone so that a tracer is not able to determine the actual destination node. Source anonymity is also enabled because the positioning routing algorithms do not require the source ID nor its position for the correct routing. We develop anonymity protocols for both routeless and route-based data delivery algorithms. To evaluate anonymity, we propose a "measure of anonymity" and we develop an analytical model to evaluate it. By using this model we perform an extensive analysis of the anonymity protocols to determine the parameters that most impact the anonymity level.

[1] L. Sweeney, “K-Anonymity: A Model for Protecting Privacy,” Int'l J. Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 5, pp. 557-570, 2002.
[2] R. Sherwood, B. Bhattacharjee, and A. Srinivasan, “P5: A Protocol for Scalable Anonymous Communication,” Proc. IEEE Symp. Security and Privacy, pp. 53-65, May 2002.
[3] V. Scarlata, B. Levine, and C. Shields, “Responder Anonymity and Anonymous Peer-to-Peer File Sharing,” Proc. Ninth IEEE Int'l Conf. Network Protocols (ICNP), 2001.
[4] C.E. Perkins and E.M. Royer, “Ad-Hoc On-Demand Distance Vector Routing,” Proc. Second IEEE Workshop Mobile Computing Systems and Applications (WMCSA '99), pp. 90-100, 1999.
[5] D. Johnson and D. Maltz, “Dynamic Source Routing in Ad Hoc Wireless Networks,” ACM SIGCOMM Computer Comm. Rev., 1996.
[6] C.E. Perkins and P. Bhagwat, “Highly Dynamic Destination-Sequenced Distance Vector Routing (DSDV) for Mobile Computers,” Proc. ACM Conf. Comm. Architectures, Protocols and Applications (SIGCOMM '94), 1994.
[7] I. Stojmenovic, “Position-Based Routing in Ad Hoc Networks,” IEEE Comm. Magazine, vol. 40, no. 7, pp. 128-134, July 2002.
[8] B. Karp and H.T. Kung, “GPSR: Greedy Perimeters Stateless Routing for Wireless Network,” Proc. MobiCom '00, 2000.
[9] M.K. Reiter and A.D. Rubin, “Crowds: Anonymity for Web Transactions,” ACM Trans. Information and System Security, vol. 1, no. 1, pp. 6-92, 1998.
[10] X. Jiang and T. Camp, “Review of Geocasting Protocols for a Mobile Ad Hoc Network,” Proc. Grace Hopper Celebration (GHC '02), 2002.
[11] Y.-B. Ko and N.H. Vaidya, “Geocasting in Mobile Ad Hoc Networks: Location-Based Multicast Algorithms,” Proc. Second IEEE Workshop Mobile Computer Systems and Applications (WMCSA '99), 1999.
[12] A. Pfitzmann, How to Implement ISDNs without User Observability—Some Remarks, Interner Bericht 14, Universität Karlsruhe, 1985.
[13] Navstar GPS Operation, http://tycho.usno.navy.milgpsinfo. html, 2007.
[14] J. Li, J. Jannotti, D.S.J. De Couto, D.R. Karger, and R. Morris, “A Scalable Location Service for Geographic Ad Hoc Routing,” Proc. MobiCom '00, 2000.
[15] Y. Xue, B. Li, and K. Nahrstedt, “A Scalable Location Management Scheme in Mobile Ad-Hoc Networks,” Proc. 26th Ann. IEEE Conf. Local Computer Networks (LCN '01), 2001.
[16] X. Wu, “VPDS: Virtual Home Region Based Distributed Position Service in Mobile Ad Hoc Networks,” Proc. 25th Int'l Conf. Distributed Computing Systems (ICDCS '05), 2005.
[17] Y. Tseng, S. Ni, Y. Chen, and J. Sheu, “The Broadcast Storm Problem in a Mobile Ad Hoc Network,” Proc. MobiCom '99, Aug. 1999.
[18] W. Luo and J. Wu, “On Reducing Broadcast Redundancy in Ad Hoc Wireless Networks,” IEEE Trans. Mobile Computing, vol. 1, no. 2, pp. 111-122, Apr.-June 2002.
[19] R. Ganhdi, S. Parthasarathy, and A. Mishra, “Minimizing Broadcast Latency and Redundancy in Ad Hoc Networks,” Proc. MobiHoc '03, 2003.
[20] A. Pfitzmann and M. Waidner, “Networks without User Observability—Design Options,” Computers & Security, vol. 6, no. 2, pp.158-166, 1987.
[21] R. Thomas, H. Gilbert, and G. Mazziotto, “Influence of the Moving of the Mobile Stations on the Performance of a Radio Cellular Network,” Proc. Third Nordic Seminar on Digital Land Mobile Radio Comm., 1988.
[22] D.L. Chaum, “Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms,” Comm. ACM, vol. 24, no. 2, pp. 84-88, 1981.
[23] H. Federrath, A. Jerichow, and A. Pfitzmann, “MIXes in Mobile Communication Systems: Location Management with Privacy,” Proc. First Int'l Workshop Information Hiding, pp. 121-135, 1996.
[24] M.J. Freedman and R. Morris, “A Peer-to-Peer Anonymizing Network Layer,” Proc. Ninth ACM Conf. Computer and Comm. Security (CCS '02), 2002.
[25] M. Reed, P. Syverson, and D. Goldschlag, “Anonymous Connections and Onion Routing,” IEEE J. Selected Areas in Comm., special issue on copyright and privacy protection, 1998.
[26] R. Dingledine, N. Mathewson, and P. Syverson, “Tor: The Second-Generation Onion Router,” Proc. 13th Usenix Security Symp., 2004.
[27] J. Camenisch and A. Lysyanskaya, “A Formal Treatment of Onion Routing,” Proc. 25th Ann. Int'l Cryptology Conf. (CRYPTO '05), 2005.
[28] X. Wu and B. Bhargava, “AO2P: Ad Hoc On-Demand Position-Based Private Routing,” IEEE Trans. Mobile Computing, vol. 4, no. 4, pp. 335-348, July/Aug. 2005.
[29] D. Katabi and J. Wroclawski, “A Framework for Scalable Global IP-Anycast (GIA),” Proc. ACM Conf. Applications, Technologies, Architectures, and Protocols for Computer Comm. (SIGCOMM '00), pp. 3-15, 2000.
[30] J. Kong and X. Hong, “ANODR: Anonymous on Demand Routing with Untraceable Routes for Mobile Ad-Hoc Networks,” Proc. MobiHoc '03, June 2003.
[31] Y. Zhang, W. Liu, and W. Luo, “Anonymous Communications in Mobile Ad Hoc Networks,” Proc. INFOCOM '05, 2005.
[32] D. Kesdogan, J. Egner, and R. Buschkes, “Stop-and-Go-MIXes Providing Probabilistic Anonymity in an Open System,” Proc. Int'l Workshop Information Hiding, 1998.
[33] A. Serjantov and G. Danezis, “Towards an Information Theoretic Metric for Anonymity,” Proc. Privacy Enhancing Technologies Workshop (PET '02), R. Dingledine and P. Syverson, eds., 2002.

Index Terms:
Anonymous communication, ad hoc routing protocols, privacy analysis
Citation:
Xiaoxin Wu, Elisa Bertino, "An Analysis Study on Zone-Based Anonymous Communication in Mobile Ad Hoc Networks," IEEE Transactions on Dependable and Secure Computing, vol. 4, no. 4, pp. 252-265, Oct.-Dec. 2007, doi:10.1109/TDSC.2007.70213
Usage of this product signifies your acceptance of the Terms of Use.