Mobile Ad hoc Networks (MANET) is a self
configurable and wireless network for mobile devices. They
are capable of attracting choices for military operations. Due
to the ad hoc behavior it provides fast operation and doesn’t
provide any network infrastructure and so the
communications are anonymous. When the communication
is being taken place the identities will not be disclosed to each
other or to third parties. This type of anonymous
communication can be revealed by means of traffic analysis.
Traffic analysis is an advanced approach that exposes the
source and destination of the users in anonymous
communication. Presently it includes protocols used for
mitigating anonymous communication in MANETs. It
achieves good accuracy is disclosing the hidden traffic
patterns.
Published In : IJCAT Journal Volume 2, Issue 7
Date of Publication : July 2015
Pages : 259 - 268
Figures :03
Tables : 02
Publication Link :TPRS: An Effective Traffic Pattern Discovery
System in Manets
D. Ganesh : Department of Computer Science and Engg.
Swetha Institute of Technology & Sciences, Tirupati
P. Nageswara Rao : Associate Professor & HEAD of CSE.
Swetha Institute of Technology & Sciences, Tirupati
Anonymous Communication
Traffic Analysis
Ad-hoc Networks
TPDS is basically an attacking system, which only needs
to capture the raw traffic from the PHY/MAC layer
without looking into the contents of the intercepted
packets. TPDS constructs a sequence of point-to-point
traffic matrices to derive the end-to-end traffic matrix and
to use the heuristic data processing model to reveal the
hidden traffic patterns from the end-to-end matrix. The
study demonstrates the existing MANET system can
achieve very restricted anonymity under the attack of
TPDS.
[1] J. Kong, X. Hong, and M. Gerla, “An Identity-Free and
On-Demand Routing Scheme against Anonymity
Threats in Mobile Ad Hoc Networks,” IEEE Trans.
Mobile Computing, vol. 6, no. 8, pp. 888-902, Aug.
2007.
[2] Y. Zhang, W. Liu, W. Lou, and Y. Fang, “MASK:
Anonymous On-Demand Routing in Mobile Ad Hoc
Networks,” IEEE Trans.Wireless Comm., vol. 5, no. 9,
pp. 2376-2385, Sept. 2006.
[3] Y. Qin and D. Huang, “OLAR: On-Demand
Lightweight Anonymous Routing in MANETs,” Proc.
Fourth Int’l Conf. Mobile Computing and Ubiquitous
Networking (ICMU ’08), pp. 72-79, 2008.
[4] M. Blaze, J. Ioannidis, A. Keromytis, T. Malkin, and
A. Rubin, “WAR: Wireless Anonymous Routing,”
Proc. Int’l Conf. Security Protocols, pp. 218-232, 2005.
[5] A. Boukerche, K. El-Khatib, L. Xu, and L. Korba,
“SDAR: A Secure Distributed Anonymous Routing
Protocol for Wireless and Mobile Ad Hoc Networks,”
Proc. IEEE 29th Ann. Int’l Conf. Local Computer
Networks (LCN ’04), pp. 618-624, 2004.
[6] S. Seys and B. Preneel, “ARM: Anonymous Routing
Protocol for Mobile Ad Hoc Networks,” Proc. IEEE
20th Int’l Conf. Advanced Information Networking and
Applications Workshops (AINA Workshops ’06), pp.
133-137, 2006.
[7] R. Shokri, M. Yabandeh, and N. Yazdani,
“Anonymous Routing in MANET Using Random
Identifiers,” Proc. Sixth Int’l Conf. Networking (ICN
’07), p. 2, 2007.
[8] R. Song, L. Korba, and G. Yee, “AnonDSR: Efficient
Anonymous Dynamic Source Routing for Mobile Ad-
Hoc Networks,” Proc. Third ACM Workshop Security
of Ad Hoc and Sensor Networks (SASN ’05), pp. 33-
42, 2005.
[9] M. Reed, P. Syverson, and D. Goldschlag,
“Anonymous Connections and Onion Routing,” IEEE
J. Selected Areas in Comm., vol. 16, no. 4, pp. 482-
494, May 2002. [10] D. Chaum, “Untraceable Electronic Mail, Return
Addresses, and Digital Pseudonyms,” Comm. ACM,
vol. 24, no. 2, pp. 84-88, 1981.
[11] J. Raymond, “Traffic Analysis: Protocols, Attacks,
Design Issues, and Open Problems,” Proc. Int’l
Workshop Designing Privacy Enhancing Technologies:
Design Issues in Anonymity and Unobservability, pp.
10-29, 2001.
[12] W. Dai, “Two Attacks against a PipeNet-Like Protocol
Once Used by the Freedom Service,”
http://weidai.com/freedomattacks.txt, 2013.
[13] X. Wang, S. Chen, and S. Jajodia, “Network Flow
Watermarking Attack on Low-Latency Anonymous
Communication Systems,” Proc. IEEE Symp. Security
and Privacy, pp. 116-130, 2007.
[14] M. Reiter and A. Rubin, “Crowds: Anonymity for Web
Transactions,” ACM Trans. Information and System
Security, vol. 1, no. 1, pp. 66-92, 1998.
[15] M. Wright, M. Adler, B. Levine, and C. Shields, “The
Predecessor Attack: An Analysis of a Threat to
Anonymous Communications Systems,” ACM Trans.
Information and System Security, vol. 7, no. 4, pp.
489-522, 2004.QIN ET AL.: STARS: A
STATISTICAL TRAFFIC PATTERN DISCOVERY
SYSTEM FOR MANETS 191 Fig. 6. Evaluation
results.
[16] D. Figueiredo, P. Nain, and D. Towsley, “On the
Analysis of the Predecessor Attack on Anonymity
Systems,” technical report, Computer Science, pp. 04-
65, 2004.
[17] G. Danezis, “Statistical Disclosure Attacks: Traffic
Confirmation in Open Environments,” Proc. Security
and Privacy in the Age of Uncertainty (SEC ’03), vol.
122, pp. 421-426, 2003.
[18] G. Danezis and A. Serjantov, “Statistical Disclosure or
Intersection Attacks on Anonymity Systems,” Proc.
Sixth Information Hiding Workshop (IH ’04), pp. 293-
308, 2004.
[19] G. Danezis, C. Diaz, and C. Troncoso, “Two-Sided
Statistical Disclosure Attack,” Proc. Seventh Int’l
Conf. Privacy Enhancing Technologies, pp. 30-44,
2007.
[20] C. Troncoso, B. Gierlichs, B. Preneel, and I.
Verbauwhede, “Perfect Matching Disclosure Attacks,”
Proc. Eighth Int’l Symp. Privacy Enhancing
Technologies, pp. 2-23, 2008.
[21] D. Huang, “Unlinkability Measure for IEEE 802.11
Based MANETs,” IEEE Trans. Wireless Comm., vol.
7, no. 3, pp. 1025-1034, Mar. 2008.
[22] D. Chaum, “The Dining Cryptographers Problem:
Unconditional Sender and Recipient Untraceability,” J.
Cryptology, vol. 1, no. 1, pp. 65-75, 1988.
[23] T. He, H. Wong, and K. Lee, “Traffic Analysis in
Anonymous MANETs,” Proc. Military Comm. Conf.
(MILCOM ’08), pp. 1-7, 2008.
[24] Y. Liu, R. Zhang, J. Shi, and Y. Zhang, “Traffic
Inference in Anonymous MANETs,” Proc. IEEE
Seventh Ann. Comm. Soc. Conf. Sensor Mesh and Ad
Hoc Comm. and Networks (SECON ’10), pp. 1-9,
2010.
[25] J. Wexler, “All About Wi-Fi Location Tracking,”
Network World, http://features.techworld.com/mobilewireless/
2374/all-aboutwi-fi-location-tracking/, 2004.
[26] Scalable Network Technologies, “QualN