Protection Against Mobile Tracing Through Motion-MIX for Mobile Wireless Nodes

被引:3
作者
Kong, Jiejun [1 ]
Hong, Xiaoyan [2 ]
Wu, Dapeng Oliver [3 ]
机构
[1] Scalable Network Technol Inc, Los Angeles, CA 90045 USA
[2] Univ Alabama, Dept Comp Sci, Tuscaloosa, AL 35487 USA
[3] Univ Florida, Dept Elect & Comp Engn, Gainesville, FL 32611 USA
基金
美国国家科学基金会;
关键词
Anonymity; mobile ad hoc network (MANET); mobile tracing; motion MIX; ANONYMITY; SCHEME;
D O I
10.1109/TVT.2008.2005990
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Mobile wireless networks, such as mobile ad hoc networks (MANETs), are vulnerable to passive attacks that threaten the privacy of communications. Moreover, threats can now be launched from mobile platforms and with new techniques for eavesdropping, locating, and fingerprinting wireless transmissions. Recently, many wireless anonymous schemes have been studied, and mobility often plays an important role with regard to the effectiveness of wireless anonymity. In this paper, we focus on the impact of node motion behaviors. We first illustrate the emerging anonymity threat of venue privacy attacks (VPAs) to trace mobile wireless nodes. We then propose "motion-MIX" as the countermeasure to defend against the threat. Motion-MIX calls for protection at all the layers of the protocol stack. We further use a new asymptotic security model to verify motion-MIX's effectiveness against VPAs. In a scalable ad hoc network, we prove that the probability of security breach is negligible with respect to the number of network nodes.
引用
收藏
页码:2406 / 2416
页数:11
相关论文
共 41 条
  • [1] Aad Imad., 2006, Securecomm and Workshops, 2006, P1, DOI DOI 10.1109/SECCOMW.2006.359571
  • [2] [Anonymous], P 1 GERM WORKSH MOB
  • [3] [Anonymous], P IASTED INT C COMM
  • [4] [Anonymous], 2002, Proc. of Privacy Enhancing Technologies (PET)
  • [5] [Anonymous], P SIGCOMM
  • [6] [Anonymous], PIPENET 1 1
  • [7] [Anonymous], P 1 ANN INT C MOB CO
  • [8] [Anonymous], 2001, FDN CRYPTOGRAPHY BAS
  • [9] Untraceable mobility or how to travel incognito
    Ateniese, G
    Herzberg, A
    Krawczyk, H
    Tsudik, G
    [J]. COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 1999, 31 (08): : 871 - 884
  • [10] Mix zones: User privacy in location-aware services
    Beresford, AR
    Stajano, F
    [J]. SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2004, : 127 - 131