PCM: a privacy-preserving detection mechanism in mobile ad hoc networks

Authors

  • Bo Zhu,

    Corresponding author
    1. Concordia Institute for Information Systems Engineering, Concordia University, 1515 Ste-Catherine Street West, Montreal, Quebec H3G 2W1, Canada
    • Concordia Institute for Information Systems Engineering, Concordia University, 1515 Ste-Catherine Street West, Montreal, Quebec H3G 2W1, Canada.
    Search for more papers by this author
    • Member, IEEE.

  • Kui Ren,

    1. Department of Electrical and Computer Engineering, Illinois Institute of Technology, Chicago, IL 60616, U.S.A.
    Search for more papers by this author
    • Member, IEEE.

  • Lingyu Wang,

    1. Concordia Institute for Information Systems Engineering, Concordia University, 1515 Ste-Catherine Street West, Montreal, Quebec H3G 2W1, Canada
    Search for more papers by this author
    • Member, IEEE.

  • Mourad Debbabi

    1. Concordia Institute for Information Systems Engineering, Concordia University, 1515 Ste-Catherine Street West, Montreal, Quebec H3G 2W1, Canada
    Search for more papers by this author
    • Senior Member, IEEE.


  • A preliminary version of this paper appeared in Proceedings of the 1st Workshop on Wireless Security and Privacy (WiSP'08), held in conjunction with IEEE ICDCS 2008.

Abstract

Although extensive research work has been undertaken to secure mobile ad hoc networks, till recently, researchers began to pay attention to the anonymity issue, and this issue was investigated mainly in terms of secure routing and data forwarding. We indicate that, in mobile ad hoc networks, there is an increasing interest in providing anonymity for the witnesses, i.e., those users who share their knowledge in detecting either malicious or selfish users. On the other hand, it is also a challenging problem to prevent the misuse of anonymous sources. In this paper, we propose the PlainClothesMan (PCM) protocol to provide anonymity for the witness who helps identify malicious or selfish users. Once there are more than a certain number of claims from distinct users against the same user, she is identified as a malicious or selfish user. Moreover, in PCM, the misuse of the witness anonymity is prevented in such a way that any malicious user who broadcasts multiple invalid claims against the same user for the same reason can be identified. Two exemplary scenarios are designed and simulated to model the necessities of witness anonymity in mobile ad hoc networks. Simulation results show that witness anonymity is very important for ensuring proper and efficient executions of fundamental functionalities of mobile ad hoc networks, e.g., certificate revocation and fairness, and PCM is both effective and efficient in providing such a type of anonymity. Copyright © 2009 John Wiley & Sons, Ltd.

Ancillary