TPRS: An Effective Traffic Pattern Discovery System in Manets  
  Authors : D. Ganesh; P. Nageswara Rao

 

Mobile Ad hoc Networks (MANET) is a self configurable and wireless network for mobile devices. They are capable of attracting choices for military operations. Due to the ad hoc behavior it provides fast operation and doesn’t provide any network infrastructure and so the communications are anonymous. When the communication is being taken place the identities will not be disclosed to each other or to third parties. This type of anonymous communication can be revealed by means of traffic analysis. Traffic analysis is an advanced approach that exposes the source and destination of the users in anonymous communication. Presently it includes protocols used for mitigating anonymous communication in MANETs. It achieves good accuracy is disclosing the hidden traffic patterns.

 

Published In : IJCAT Journal Volume 2, Issue 7

Date of Publication : July 2015

Pages : 259 - 268

Figures :03

Tables : 02

Publication Link :TPRS: An Effective Traffic Pattern Discovery System in Manets

 

 

 

D. Ganesh : Department of Computer Science and Engg. Swetha Institute of Technology & Sciences, Tirupati

P. Nageswara Rao : Associate Professor & HEAD of CSE. Swetha Institute of Technology & Sciences, Tirupati

 

 

 

 

 

 

 

Anonymous Communication

Traffic Analysis

Ad-hoc Networks

TPDS is basically an attacking system, which only needs to capture the raw traffic from the PHY/MAC layer without looking into the contents of the intercepted packets. TPDS constructs a sequence of point-to-point traffic matrices to derive the end-to-end traffic matrix and to use the heuristic data processing model to reveal the hidden traffic patterns from the end-to-end matrix. The study demonstrates the existing MANET system can achieve very restricted anonymity under the attack of TPDS.

 

 

 

 

 

 

 

 

 

[1] J. Kong, X. Hong, and M. Gerla, “An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks,” IEEE Trans. Mobile Computing, vol. 6, no. 8, pp. 888-902, Aug. 2007. [2] Y. Zhang, W. Liu, W. Lou, and Y. Fang, “MASK: Anonymous On-Demand Routing in Mobile Ad Hoc Networks,” IEEE Trans.Wireless Comm., vol. 5, no. 9, pp. 2376-2385, Sept. 2006. [3] Y. Qin and D. Huang, “OLAR: On-Demand Lightweight Anonymous Routing in MANETs,” Proc. Fourth Int’l Conf. Mobile Computing and Ubiquitous Networking (ICMU ’08), pp. 72-79, 2008. [4] M. Blaze, J. Ioannidis, A. Keromytis, T. Malkin, and A. Rubin, “WAR: Wireless Anonymous Routing,” Proc. Int’l Conf. Security Protocols, pp. 218-232, 2005. [5] A. Boukerche, K. El-Khatib, L. Xu, and L. Korba, “SDAR: A Secure Distributed Anonymous Routing Protocol for Wireless and Mobile Ad Hoc Networks,” Proc. IEEE 29th Ann. Int’l Conf. Local Computer Networks (LCN ’04), pp. 618-624, 2004. [6] S. Seys and B. Preneel, “ARM: Anonymous Routing Protocol for Mobile Ad Hoc Networks,” Proc. IEEE 20th Int’l Conf. Advanced Information Networking and Applications Workshops (AINA Workshops ’06), pp. 133-137, 2006. [7] R. Shokri, M. Yabandeh, and N. Yazdani, “Anonymous Routing in MANET Using Random Identifiers,” Proc. Sixth Int’l Conf. Networking (ICN ’07), p. 2, 2007. [8] R. Song, L. Korba, and G. Yee, “AnonDSR: Efficient Anonymous Dynamic Source Routing for Mobile Ad- Hoc Networks,” Proc. Third ACM Workshop Security of Ad Hoc and Sensor Networks (SASN ’05), pp. 33- 42, 2005. [9] M. Reed, P. Syverson, and D. Goldschlag, “Anonymous Connections and Onion Routing,” IEEE J. Selected Areas in Comm., vol. 16, no. 4, pp. 482- 494, May 2002. [10] D. Chaum, “Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms,” Comm. ACM, vol. 24, no. 2, pp. 84-88, 1981. [11] J. Raymond, “Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems,” Proc. Int’l Workshop Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability, pp. 10-29, 2001. [12] W. Dai, “Two Attacks against a PipeNet-Like Protocol Once Used by the Freedom Service,” http://weidai.com/freedomattacks.txt, 2013. [13] X. Wang, S. Chen, and S. Jajodia, “Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems,” Proc. IEEE Symp. Security and Privacy, pp. 116-130, 2007. [14] M. Reiter and A. Rubin, “Crowds: Anonymity for Web Transactions,” ACM Trans. Information and System Security, vol. 1, no. 1, pp. 66-92, 1998. [15] M. Wright, M. Adler, B. Levine, and C. Shields, “The Predecessor Attack: An Analysis of a Threat to Anonymous Communications Systems,” ACM Trans. Information and System Security, vol. 7, no. 4, pp. 489-522, 2004.QIN ET AL.: STARS: A STATISTICAL TRAFFIC PATTERN DISCOVERY SYSTEM FOR MANETS 191 Fig. 6. Evaluation results. [16] D. Figueiredo, P. Nain, and D. Towsley, “On the Analysis of the Predecessor Attack on Anonymity Systems,” technical report, Computer Science, pp. 04- 65, 2004. [17] G. Danezis, “Statistical Disclosure Attacks: Traffic Confirmation in Open Environments,” Proc. Security and Privacy in the Age of Uncertainty (SEC ’03), vol. 122, pp. 421-426, 2003. [18] G. Danezis and A. Serjantov, “Statistical Disclosure or Intersection Attacks on Anonymity Systems,” Proc. Sixth Information Hiding Workshop (IH ’04), pp. 293- 308, 2004. [19] G. Danezis, C. Diaz, and C. Troncoso, “Two-Sided Statistical Disclosure Attack,” Proc. Seventh Int’l Conf. Privacy Enhancing Technologies, pp. 30-44, 2007. [20] C. Troncoso, B. Gierlichs, B. Preneel, and I. Verbauwhede, “Perfect Matching Disclosure Attacks,” Proc. Eighth Int’l Symp. Privacy Enhancing Technologies, pp. 2-23, 2008. [21] D. Huang, “Unlinkability Measure for IEEE 802.11 Based MANETs,” IEEE Trans. Wireless Comm., vol. 7, no. 3, pp. 1025-1034, Mar. 2008. [22] D. Chaum, “The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability,” J. Cryptology, vol. 1, no. 1, pp. 65-75, 1988. [23] T. He, H. Wong, and K. Lee, “Traffic Analysis in Anonymous MANETs,” Proc. Military Comm. Conf. (MILCOM ’08), pp. 1-7, 2008. [24] Y. Liu, R. Zhang, J. Shi, and Y. Zhang, “Traffic Inference in Anonymous MANETs,” Proc. IEEE Seventh Ann. Comm. Soc. Conf. Sensor Mesh and Ad Hoc Comm. and Networks (SECON ’10), pp. 1-9, 2010. [25] J. Wexler, “All About Wi-Fi Location Tracking,” Network World, http://features.techworld.com/mobilewireless/ 2374/all-aboutwi-fi-location-tracking/, 2004. [26] Scalable Network Technologies, “QualN