Chameleon and the Identity-Anonymity Paradox: Anonymity in Mobile Ad Hoc Networks

In this paper we first present the identity-anonymity paradox, which explains why identities are needed to achieve reliable anonymity. Then, we introduce Chameleon, a novel anonymous overlay network for mobile ad hoc environments, and describe it in details with the support of state transition diagrams. To the best of our knowledge, this is the first low-latency anonymous communication mechanism designed for a mobile ad hoc network setting.

[1]  Xiaoyan Hong,et al.  ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks , 2003, MobiHoc '03.

[2]  Joseph P. Macker,et al.  Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations , 1999, RFC.

[3]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[5]  Azzedine Boukerche,et al.  SDAR: a secure distributed anonymous routing protocol for wireless and mobile ad hoc networks , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[6]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[7]  Charles E. Perkins,et al.  Service Location Protocol , 1997, RFC.

[8]  Bernhard Plattner,et al.  Introducing MorphMix: peer-to-peer based anonymous Internet usage with collusion detection , 2002, WPES '02.

[9]  Michael K. Reiter,et al.  Crowds: anonymity for Web transactions , 1998, TSEC.

[10]  Tuomas Aura,et al.  Cryptographically Generated Addresses (CGA) , 2005, ISC.

[11]  Wilson Vicente Ruggiero,et al.  A Trust-Based Security Architecture for Small and Medium-Sized Mobile Ad Hoc Networks , 2004 .

[12]  Stefan Schlott,et al.  Identification in Ad Hoc Networks , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).

[13]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[14]  Nitin H. Vaidya,et al.  A mix route algorithm for mix-net in wireless mobile ad hoc networks , 2004, 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE Cat. No.04EX975).

[15]  Srdjan Capkun,et al.  Mobility helps security in ad hoc networks , 2003, MobiHoc '03.

[16]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[17]  Leonardo A. Martucci,et al.  Requirements for Privacy-Enhancements in Mobile Ad Hoc Networks , 2005, GI Jahrestagung.