Towards Anonymity in Mobile Ad Hoc Networks: The Chameleon Protocol and its Anonymity Analysis

نویسندگان

  • Leonardo A. Martucci
  • Christer Andersson
  • Simone Fischer-Hübner
چکیده

This paper presents Chameleon, a novel anonymous overlay network for mobile ad hoc environments. As far we know, Chameleon is the first lowlatency anonymous overlay network applied in a mobile ad hoc setting. It was designed with the special characteristics of mobile ad hoc networks in mind, such as limited battery lifetime, user mobility and vanishing nodes. In this paper, we also evaluate Chameleon against a number of requirements that an anonymous overlay network should adhere to in order to be suitable for mobile ad hoc networks. In particular, the anonymity properties of Chameleon are thoroughly analyzed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Chameleon and the Identity-Anonymity Paradox: Anonymity in Mobile Ad Hoc Networks

In this paper we first present the identity-anonymity paradox, which explains why identities are needed to achieve reliable anonymity. Then, we introduce Chameleon, a novel anonymous overlay network for mobile ad hoc environments, and describe it in details with the support of state transition diagrams. To the best of our knowledge, this is the first low-latency anonymous communication mechanis...

متن کامل

Performance evaluation of an anonymity providing protocol for wireless ad hoc networks

Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content exchanged between nodes, routing information may reveal the identities of communicating nodes and their relationships. This paper describes our effort to provide anonymous communication services in mobile and wireless ad ho...

متن کامل

Achieving Anonymity in Mobile Ad Hoc Networks Using Fuzzy Position Information

Traditionally the anonymity of an entity of interest can be achieved by hiding it among a group of other entities with similar characteristics, i.e., an anonymity set. In mobile ad hoc networks, generating and maintaining such an anonymity set for any ad hoc node are challenging because of the node mobility and consequently of the dynamic network topology. In this paper, we address the problem ...

متن کامل

An Anonymity-Based Secure On-Demand Routing for Mobile Ad Hoc Networks

Privacy and Security have emerged as an important research issue in Mobile Ad Hoc Networks (MANET) due to its unique nature such as scarce of resources and absence of centralized authority. There are number of protocols have been proposed to provide privacy and security for data communication in an adverse environment, but those protocols are compromised in many ways by the attackers. The conce...

متن کامل

ID-Based Key Agreement with Anonymity for Ad Hoc Networks

Security support is a must for ad hoc networks. However, existing key agreement schemes for ad hoc networks ignore the issue of entity anonymity. Without anonymity, the adversary can easily identify and track specific entities in the communications. Not only entities’ movement information is valuable to the adversary but also the adversary can launch heavy attacks on those important nodes, base...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006