On-Demand Anonymous Routing with Distance Vector Protecting Traffic Privacy in Wireless Multi-hop Networks

Because of easy accessible medium in wireless networks, use of these wireless networks in military applications poses several security issues. Likewise, in the business field, despite the emerging static wireless Internet access, the same security issues remains. On example is the passive attack in which attackers attempt to overhear network communications from the outside. Confidentiality can be further divided into two categories, namely, data confidentiality and traffic confidentiality. In this paper, for improving traffic confidentiality, we propose two anonymous routing algorithms, called randomized routing algorithm and probabilistic penalty-based routing algorithm. Both algorithms aim to differentiate routing paths to the same destination enhancing anonymity of the network traffic. We provide simulation results and demonstrate how much these two algorithm disperse routing paths in a network.

[1]  James P. Titus,et al.  Security and Privacy , 1967, 2022 IEEE Future Networks World Forum (FNWF).

[2]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[3]  Xiaoyan Hong,et al.  A new set of passive routing attacks in mobile ad hoc networks , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..

[4]  Jitendra Padhye,et al.  Routing in multi-radio, multi-hop wireless mesh networks , 2004, MobiCom '04.

[5]  Robin Kravets,et al.  Designing routing metrics for mesh networks , 2005 .

[6]  H. T. Mouftah,et al.  Wireless mesh networking , 2005, MSWiM '05.

[7]  Xiaoyan Hong,et al.  Mobility changes anonymity: new passive threats in mobile ad hoc networks , 2006, Wirel. Commun. Mob. Comput..

[8]  Claude Castelluccia,et al.  Packet Coding for Strong Anonymity in Ad Hoc Networks , 2006, 2006 Securecomm and Workshops.

[9]  Elisa Bertino,et al.  Achieving Anonymity in Mobile Ad Hoc Networks Using Fuzzy Position Information , 2006, MSN.

[10]  Yuan Xue,et al.  Preserving traffic privacy in wireless mesh networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[11]  Yang Xiao,et al.  Security and privacy in RFID and applications in telemedicine , 2006, IEEE Commun. Mag..

[12]  Ning Hu,et al.  A Hierarchical Anonymous Routing Scheme for Mobile Ad-Hoc Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[13]  Yang Xiao,et al.  LTRT: Least Total-Route Temperature Routing for Embedded Biomedical Sensor Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[14]  Xiaoyan Hong,et al.  An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks , 2007, IEEE Transactions on Mobile Computing.

[15]  Jan Kruys,et al.  Emerging Technologies in Wireless LANs: Wireless Mesh Networks , 2007 .

[16]  Daisuke Takahashi,et al.  Temperature-Aware Routing for Telemedicine Applications in Embedded Biomedical Sensor Networks , 2008, EURASIP J. Wirel. Commun. Netw..

[17]  Yang Xiao,et al.  Low-cost wireless sensor networks for remote cardiac patients monitoring applications , 2008, Wirel. Commun. Mob. Comput..

[18]  Fei Hu,et al.  Error-resistant RFID-assisted wireless sensor networks for cardiac telehealthcare , 2009 .

[19]  Yang Xiao,et al.  Error-resistant RFID-assisted wireless sensor networks for cardiac telehealthcare , 2009, Wirel. Commun. Mob. Comput..