Source—destination obfuscation in wireless ad hocnetworks
Version of Record online: 15 JUL 2010
Copyright © 2010 John Wiley & Sons, Ltd.
Security and Communication Networks
Volume 4, Issue 8, pages 888–901, August 2011
How to Cite
Hayajneh, T., Doomun, R., Krishnamurthy, P. and Tipper, D. (2011), Source—destination obfuscation in wireless ad hocnetworks. Security Comm. Networks, 4: 888–901. doi: 10.1002/sec.220
- Issue online: 15 JUL 2011
- Version of Record online: 15 JUL 2010
- Army Research Office MURI. Grant Number: W911NF-07-1-0318
- ad hoc;
- visual analytics
The identity and/or location of communicating entities in wireless ad hocnetworks is extremely important due to the potential of their being identified and subsequently subjected to cyber or physical attacks. In this paper, we show that a global attacker who can eavesdrop on the overall data transmissions and count them can simply visualize the transmissions and infer contextual information. Current approaches to obfuscate the locations of source and destinations do not provide protection against such attacks. We propose two novel techniques (1) SECLOUD: Source and Destination Seclusion using Clouds to obfuscate the true source/destination nodes and make them indistinguishable among a group of neighbor nodes, and (2) ANONYRING: Anonymous Ring which hides the source/destination nodes within a group of nodes that form a ring. Both proposed techniques work well even under network-wide traffic visualization by a global attacker. Furthermore the proposed techniques are shown viasimulation to be superior to existing schemes in the literature. Copyright © 2010 John Wiley & Sons, Ltd.