The Community for Technology Leaders
RSS Icon
Issue No.10 - October (2008 vol.19)
pp: 1297-1309
In this paper, we address the problem of destination anonymity for applications in mobile ad hoc networks where geographic information is ready for use in both ad hoc routing and Internet services. Geographic forwarding becomes a lightweight routing protocol in favor of the scenarios. Traditionally the anonymity of an entity of interest can be achieved by hiding it among a group of other entities with similar characteristics, i.e., an anonymity set. In mobile ad hoc networks, generating and maintaining an anonymity set for any ad hoc node is challenging because of the node mobility, consequently the dynamic network topology. We propose protocols that use the destination position to generate a geographic area called {\em anonymity zone (AZ)}. A packet for a destination is delivered to all the nodes in the AZ, which make up the anonymity set. The size of the anonymity set may decrease because nodes are mobile, yet the corresponding anonymity set management is simple. We design techniques to further improve node anonymity and reduce communication overhead. We use analysis and extensive simulation to study the node anonymity and routing performance, and to determine the parameters that most impact the anonymity level that can be achieved by our protocol.
Location-dependent and sensitive, Network-level security and protection, Routing protocols, Algorithm/protocol design and analysis
Xiaoxin Wu, Jun Liu, Xiaoyan Hong, Elisa Bertino, "Anonymous Geo-Forwarding in MANETs through Location Cloaking", IEEE Transactions on Parallel & Distributed Systems, vol.19, no. 10, pp. 1297-1309, October 2008, doi:10.1109/TPDS.2008.28
[1] G. Resta, P. Santi, and J. Simon, “Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks,” Proc. ACM MobiHoc, 2007.
[2] Y.-C. Hu and H.J. Wang, “A Framework for Location Privacy in Wireless Networks,” Proc. ACM SIGCOMM Asia Workshop, 2005.
[3] Q. He, D. Wu, and P. Khosla, “Quest for Personal Control over Mobile Location Privacy,” IEEE Comm. Magazine, vol. 42, no. 5, pp. 130-136, 2004.
[4] P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, “Enhancing Source-Location Privacy in Sensor Network Routing,” Proc. 25th IEEE Int'l Conf. Distributed Computing Systems (ICDCS), 2005.
[5] J. Kong and X. Hong, “ANODR: Anonymous on Demand Routing with Untraceable Routes for Mobile Ad-Hoc Networks,” Proc. ACM MobiHoc '03, June 2003.
[6] D. Mohapatra and S.B. Suma, “Survey of Location-Based Wireless Services,” Proc. IEEE Int'l Conf. Personal Wireless Comm. (ICPWC), 2005.
[7] X. Wu and H. Schulzrinne, “Location-Based Services in Internet Telephony,” Proc. Second IEEE Consumer Comm. and Networking Conf. (CCNC '05), Jan. 2005.
[8] I. Stojmenovic, “Position-Based Routing in Ad Hoc Networks,” IEEE Comm. Magazine, vol. 40, no. 7, pp. 128-134, July 2002.
[9] T. Camp, J. Boleng, B. Williams, L. Wilcox, and W. Navidi, “Performance Comparison of Two Location-Based Routing Protocols for Ad Hoc Networks,” Proc. IEEE INFOCOM '02, pp. 1678-1687, 2002.
[10] B. Karp and H.T. Kung, “GPSR: Greedy Perimeters Stateless Routing for Wireless Network,” Proc. ACM MobiCom, 2000.
[11] X. Wu and B. Bhargava, “AO2P: Ad Hoc On-Demand Position-Based Private Routing,” IEEE Trans. Mobile Computing, 2005.
[12] R.P. Minch, “Privacy Issues in Location-Aware Mobile Devices,” Proc. 37th Ann. Hawaii Int'l Conf. System Sciences (HICSS), 2004.
[13] B. Gedik and L. Liu, “Location Privacy in Mobile Systems: A Personalized Anonymization Model,” Proc. 25th IEEE Int'l Conf. Distributed Computing Systems (ICDCS), 2005.
[14] R. Cheng, D.V. Kalashnikov, and S. Prabhakar, “Querying Imprecise Data in Moving Object Environments,” IEEE Trans. Knowledge and Data Eng., vol. 16, no. 9, pp. 1112-1127, Sept. 2004.
[15] M.K. Reiter and A.D. Rubin, “Crowds: Anonymity for Web Transactions,” ACM Trans. Information and System Security, vol. 1, no. 1, pp. 6-92, 1998.
[16] The Keyed-Hash Message Authentication Code, FIPS 198, Nat'l Inst. Standards and Technology (NIST), 2002.
[17] K. Chen and K. Nahrstedt, “Effective Location-Guided Tree Construction Algorithms for Small Group Multicast in MANET,” Proc. IEEE INFOCOM, 2002.
[18] R. Ganhdi, S. Parthasarathy, and A. Mishra, “Minimizing Broadcast Latency and Redundancy in Ad Hoc Networks,” Proc. ACM MobiHoc, 2003.
[19] W. Luo and J. Wu, “On Reducing Broadcast Redundancy in Ad Hoc Wireless Networks,” IEEE Trans. Mobile Computing, vol. 1, no. 2, pp. 111-122, Apr.-June 2002.
[20] Y. Tseng, S. Ni, Y. Chen, and J. Sheu, “The Broadcast Storm Problem in a Mobile Ad Hoc Network,” Proc. ACM MobiCom '99, Aug. 1999.
[21] X. Wu, “VPDS: Virtual Home Region Based Distributed Position Service in Mobile Ad Hoc Networks,” Proc. 25th IEEE Int'l Conf. Distributed Computing Systems (ICDCS), 2005.
[22] A. Pfitzmann and M. Kohntopp, “Anonymity, Unobservability, and Pseudonymity—A Proposal for Terminology,” LNCS 2009, H. Federrath, ed., p. 19, 2000.
[23] R. Thomas, H. Gilbert, and G. Mazziotto, “Influence of the Moving of the Mobile Stations on the Performance of a Radio Cellular Network,” Proc. Third Nordic Seminar, 1988.
[24] A. Serjantov and G. Danezis, “Towards an Information Theoretic Metric for Anonymity,” Proc. Second Int'l Workshop Privacy Enhancing Technologies (PET), 2002.
[25] QualNet, Scalable Network Technologies (SNT), http:/, 2008.
[26] J. Yoon, M. Liu, and B. Noble, “Random Waypoint Considered Harmful,” Proc. IEEE INFOCOM, 2003.
[27] D.L. Chaum, “Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms,” Comm. ACM, vol. 24, no. 2, pp. 84-88, 1981.
[28] M. Reed, P. Syverson, and D. Goldschlag, “Anonymous Connections and Onion Routing,” IEEE J. Selected Areas in Comm., special issue on copyright and privacy protection, vol. 16, no. 4, pp. 482-494, 1998.
[29] R. Sherwood, B. Bhattacharjee, and A. Srinivasan, “P5: A Protocol for Scalable Anonymous Communication,” Proc. IEEE Symp. Security and Privacy (S&P '02), pp. 53-65, May 2002.
[30] V. Scarlata, B. Levine, and C. Shields, “Responder Anonymity and Anonymous Peer-to-Peer File Sharing,” Proc. Ninth IEEE Int'l Conf. Network Protocols (ICNP), 2001.
[31] C.E. Perkins and E.M. Royer, “Ad Hoc On-Demand Distance Vector Routing,” Proc. Second IEEE Workshop Mobile Computing Systems and Applications (WMCSA '99), pp. 90-100, 1999.
[32] D. Johnson and D. Maltz, “Dynamic Source Routing in Ad Hoc Wireless Networks,” Proc. ACM SIGCOMM—Computer Comm. Rev., 1996.
[33] Y. Zhang, W. Liu, and W. Luo, “Anonymous Communications in Mobile Ad Hoc Networks,” Proc. IEEE INFOCOM, 2005.
[34] X. Wu, J. Liu, X. Hong, and E. Bertino, “Achieving Anonymity in Mobile Ad Hoc Networks Using Fuzzy Position Information,” Proc. Second Int'l Conf. Mobile Ad Hoc and Sensor Networks (MSN '06), Dec. 2006.
[35] A.R. Beresford and F. Stajano, “Mix Zones: User Privacy in Location-Aware Services,” Proc. Second IEEE Ann. Conf. Pervasive Computing and Comm. Workshops (PerCom), 2004.
[36] J. Kong, D. Wu, X. Hong, and M. Gerla, “Mobile Traffic Sensor Network versus Motion-MIX: Tracing and Protecting Mobile Wireless Nodes,” Proc. Third ACM Workshop Security of Ad Hoc and Sensor Networks (SASN '05), pp. 97-106, 2005.
[37] L. Yang, M. Jakobsson, and S. Wetzel, “Discount Anonymous on Demand Routing for Mobile Ad Hoc Networks,” Proc. Second Int'l Conf. Security and Privacy in Comm. Networks (SecureComm), 2006.
[38] I. Aad, C. Castelluccia, and J.-P. Huubaux, “Packet Coding for Strong Anonymity in Ad Hoc Networks,” Proc. Second Int'l Conf. Security and Privacy in Comm. Networks (SecureComm '06), pp. 1-10, Aug. 2006.
[39] T. Wu, Y. Xue, and Y. Cui, “Preserving Traffic Privacy in Wireless Mesh Networks,” Proc. Int'l Symp. World of Wireless, Mobile and Multimedia Networks (WoWMoM '06), June 2006.
[40] M. Gruteser and D. Grunwald, “Anonymous Usage of Location-Based Services through Spatial and Temporal Cloaking,” Proc. ACM MobiSys '03, May 2003.
17 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool