Skip to main content
Log in

On Address Privacy in Mobile Ad Hoc Networks

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

The network addresses of principals in a mobile ad hoc network (MANET) are conventionally assumed to be public information. This may cause devastating consequences for MANETs deployed in hostile environments. For example, attackers can easily locate a target principal based his known network address and then launch a pinpoint attack. This paper identifies address privacy as a new security requirement to prevent attackers from ascertaining network addresses of MANET principals. We further present Swarms, the first solution to satisfying this requirement. Swarms eliminates the conventionally explicit one-on-one mappings between MANET principals and network addresses and allows any two principals to communicate while blind to each other’s address. We quantitatively measure the address privacy offered by Swarms via an entropy-based information-theoretic metric.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

Notes

  1. A keyed-hash message authentication code should be attached to each packet to ensure its integrity, but we ignore it for brevity.

  2. \(AP_{\,d^s}(l=l_1)\) is defined to be zero for C ≥ L + l 1.

References

  1. Gruteser M, Grunwald D (2005) Enhancing location privacy in wireless LAN through disposable interface identifiers. ACM Mob Netw Appl 10(3):315–325

    Article  Google Scholar 

  2. Lou W, Fang Y (2003) A survey of wireless security in mobile ad hoc networks: challenges and available solutions. In: Chen X, Huang X, Du D-Z (eds) Ad hoc wireless networking. Kluwer Academic, New York

    Google Scholar 

  3. Zhang Y, Liu W, Lou W, Fang Y (2006) Securing mobile ad hoc networks with certificateless public keys. IEEE Trans Dependable Secure Comput 3(4):386–399

    Article  Google Scholar 

  4. Zhang Y, Liu W, Lou W, Fang Y (2006) MASK: anonymous on-demand routing in mobile ad hoc networks. IEEE Trans Wireless Commun 5(9):2376–2385

    Article  Google Scholar 

  5. Loguinov D, Kumar A, Rai V, Ganesh S (2003) Graph-theoretic analysis of structured peer-to-peer systems: routing distances and fault resilience. In: ACM SIGCOMM’03, Karlsruhe, August 2003, pp 395–406

    Google Scholar 

  6. Imase M, Itoh M (1981) Design to minimize diameter on building-block networks. IEEE Trans Comput C-30(6):439–442

    Article  MathSciNet  Google Scholar 

  7. Clausen T, Jacquet P (2003) Optimized link state routing protocol (OLSR), RFC 3626, Oct

  8. Perkins C, Belding-Royer E, Das S (2003) Ad hoc on-demand distance vector (AODV) routing, RFC 3561, July

  9. Bloom B (1970) Space/time trade-offs in hash coding with allowable errors. Comm ACM 13(7):422–426

    Article  MATH  Google Scholar 

  10. Fan L, Cao P, Almeida J, Broder AZ (2000) Summary cache: a scalable wide-area web cache sharing protocol. IEEE/ACM Trans Netw (TON) 8(3):281–293

    Article  Google Scholar 

  11. Díaz C, Seys S, Claessens J, Preneel B (2002) Towards measuring anonymity. In: Proc. Privacy Enhancing Technologies (PET 2002), ser LNCS, vol 2482. Springer, Heidelberg, pp 54–68

    Chapter  Google Scholar 

  12. Cover TM, Thomas JA (2006) Elements of information theory, 2nd ed. Wiley-Interscience, New York

    MATH  Google Scholar 

Download references

Acknowledgements

This work was supported in part by the US National Science Foundation under grants CNS-0716302 and CNS-0831963.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yanchao Zhang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zhang, Y., Ren, K. On Address Privacy in Mobile Ad Hoc Networks. Mobile Netw Appl 14, 188–197 (2009). https://doi.org/10.1007/s11036-008-0142-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-008-0142-5

Keywords

Navigation