Abstract
In this paper, an ad hoc network anonymous data forwarding method and an associated routing protocol to prevent traffic analysis is presented. This method assumes trusted closed group nodes and every node can play the role of onion relay for the anonymous data forwarding. The route discovery operation of the protocol adopts the load balancing concept. The load balancing not only improves the throughput but also helps the prevention of the traffic analysis since the load cost for camouflage traffic can be reduce and the routes change dynamically. The performance of the proposed protocol is evaluated by simulation, and compared in several major aspects with the fixed mix method for anonymous data forwarding that works over existing ad hoc routing protocol.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Deng, H., Li, W., Agrawal, D.P.: Routing security in wireless ad hoc networks. IEEE Communications Magazine, 70–75 (October 2002)
Rennhard, M., Rafaeli, S., Marthy, L., Plattner, B., Hutchinson, D.: An architecture for an anonymity network. In: Proc. of 10th IEEE Intl. Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2001), Boston, USA, June 20-22, pp. 165–170 (2001)
Raymond, J.: Traffic analysis: protocols, attacks, design issues and open problems. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 10–29. Springer, Heidelberg (2001)
Hu, Y., Perrig, A., Johnson, D.: Ariadne: A secure on-demand routing protocol for ad hoc networks. In: The 8th ACM International Conference on Mobile Computing and Networking (September 2002)
Kong, J., Hong, X., Gerla, M.: An anonymous on demand routing protolcol with untraceable routes for mobile ad hoc networks. In: Technical Report TR-030020, April, 2003, UCLA Computer Science Department, Los Angeles, California, 90025
Fasbender, A., Kesdogan, D., Kubitz, O.: Variable and Scalable Security: Protection of Location Information in Mobile IP. In: 46th IEEE Vehicular Technology Society Conference, Atlanta (March 1996)
Fasbender, A., Kesdogan, D., Kubitz, O.: Analysis of Security and Privacy in Mobile IP. In: 4th International Conference Telecommunication Systems, Modeling and Analysis, Nashvill, March 21-24 (1996)
Chaum, D.L.: Untraceable electronic mail, return address, and digital pseudonyms. Communications of the ACM 24, 2 (1981)
Newman-Wolfe, R., Venkatraman, B.: High level prevention of traffic analysis. In: Proceedings of the Seventh Annual Computer Security Applications Conference, San Antonio, December 2-6, pp. 102–109 (1991)
Guan, Y., Li, C., Xuan, D., Bettati, R., Zhao, W.: Preventing traffic analysis for realtime communication networks. In: Proceedings of Milcom (November 1999)
Berthold, O., et al.: Project anonymity and unobservability in the Internet. In: Computer Freedom and Privacy Conference 2000 (CFP 2000), Workshop on Freedom and Privacy by Design (2000)
Reed, M.G., Syverson, P., Goldschlag, D.: Anonymous connections and onion routing. In: Proceedings of the IEEE Symposium on Security and Privacy (Oakland, California), May 1997, pp. 44–54 (1997)
Jiang, S., Vaidya, N., Zhao, W.: A dynamic mix method for wireless ad hoc networks. In: Proceedings of IEEE Military Communication Conference (Milcom) (October 2001)
Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding Routing Information. In: Workshop on Information Hiding, Cambridge, UK (May 1996)
Fall, K., Varadhan, K. (eds.): The ns Manual (2003), available from http://wwwmash.cs.berkely.edu/ns/
Broch, J., Maltz, D.A., Johnson, D.B., Hu, Y.-C., Jetcheva, J.: A performance comparison of multi-hop wireless ad hoc network routing protocols. In: ACM/IEEE International Conference on Mobile Computing and Networking(MobiCom 1998) (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, S., Yun, H.Y., Lu, M. (2004). Load Balanced Onion Relay for Prevention of Traffic Analysis in Ad Hoc Networks. In: Kahng, HK., Goto, S. (eds) Information Networking. Networking Technologies for Broadband and Mobile Networks. ICOIN 2004. Lecture Notes in Computer Science, vol 3090. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-25978-7_3
Download citation
DOI: https://doi.org/10.1007/978-3-540-25978-7_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-23034-2
Online ISBN: 978-3-540-25978-7
eBook Packages: Springer Book Archive