Skip to main content

Load Balanced Onion Relay for Prevention of Traffic Analysis in Ad Hoc Networks

  • Conference paper
Information Networking. Networking Technologies for Broadband and Mobile Networks (ICOIN 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3090))

Included in the following conference series:

Abstract

In this paper, an ad hoc network anonymous data forwarding method and an associated routing protocol to prevent traffic analysis is presented. This method assumes trusted closed group nodes and every node can play the role of onion relay for the anonymous data forwarding. The route discovery operation of the protocol adopts the load balancing concept. The load balancing not only improves the throughput but also helps the prevention of the traffic analysis since the load cost for camouflage traffic can be reduce and the routes change dynamically. The performance of the proposed protocol is evaluated by simulation, and compared in several major aspects with the fixed mix method for anonymous data forwarding that works over existing ad hoc routing protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Deng, H., Li, W., Agrawal, D.P.: Routing security in wireless ad hoc networks. IEEE Communications Magazine, 70–75 (October 2002)

    Google Scholar 

  2. Rennhard, M., Rafaeli, S., Marthy, L., Plattner, B., Hutchinson, D.: An architecture for an anonymity network. In: Proc. of 10th IEEE Intl. Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2001), Boston, USA, June 20-22, pp. 165–170 (2001)

    Google Scholar 

  3. Raymond, J.: Traffic analysis: protocols, attacks, design issues and open problems. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 10–29. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  4. Hu, Y., Perrig, A., Johnson, D.: Ariadne: A secure on-demand routing protocol for ad hoc networks. In: The 8th ACM International Conference on Mobile Computing and Networking (September 2002)

    Google Scholar 

  5. Kong, J., Hong, X., Gerla, M.: An anonymous on demand routing protolcol with untraceable routes for mobile ad hoc networks. In: Technical Report TR-030020, April, 2003, UCLA Computer Science Department, Los Angeles, California, 90025

    Google Scholar 

  6. Fasbender, A., Kesdogan, D., Kubitz, O.: Variable and Scalable Security: Protection of Location Information in Mobile IP. In: 46th IEEE Vehicular Technology Society Conference, Atlanta (March 1996)

    Google Scholar 

  7. Fasbender, A., Kesdogan, D., Kubitz, O.: Analysis of Security and Privacy in Mobile IP. In: 4th International Conference Telecommunication Systems, Modeling and Analysis, Nashvill, March 21-24 (1996)

    Google Scholar 

  8. Chaum, D.L.: Untraceable electronic mail, return address, and digital pseudonyms. Communications of the ACM 24, 2 (1981)

    Article  Google Scholar 

  9. Newman-Wolfe, R., Venkatraman, B.: High level prevention of traffic analysis. In: Proceedings of the Seventh Annual Computer Security Applications Conference, San Antonio, December 2-6, pp. 102–109 (1991)

    Google Scholar 

  10. Guan, Y., Li, C., Xuan, D., Bettati, R., Zhao, W.: Preventing traffic analysis for realtime communication networks. In: Proceedings of Milcom (November 1999)

    Google Scholar 

  11. Berthold, O., et al.: Project anonymity and unobservability in the Internet. In: Computer Freedom and Privacy Conference 2000 (CFP 2000), Workshop on Freedom and Privacy by Design (2000)

    Google Scholar 

  12. Reed, M.G., Syverson, P., Goldschlag, D.: Anonymous connections and onion routing. In: Proceedings of the IEEE Symposium on Security and Privacy (Oakland, California), May 1997, pp. 44–54 (1997)

    Google Scholar 

  13. Jiang, S., Vaidya, N., Zhao, W.: A dynamic mix method for wireless ad hoc networks. In: Proceedings of IEEE Military Communication Conference (Milcom) (October 2001)

    Google Scholar 

  14. Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding Routing Information. In: Workshop on Information Hiding, Cambridge, UK (May 1996)

    Google Scholar 

  15. Fall, K., Varadhan, K. (eds.): The ns Manual (2003), available from http://wwwmash.cs.berkely.edu/ns/

  16. Broch, J., Maltz, D.A., Johnson, D.B., Hu, Y.-C., Jetcheva, J.: A performance comparison of multi-hop wireless ad hoc network routing protocols. In: ACM/IEEE International Conference on Mobile Computing and Networking(MobiCom 1998) (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, S., Yun, H.Y., Lu, M. (2004). Load Balanced Onion Relay for Prevention of Traffic Analysis in Ad Hoc Networks. In: Kahng, HK., Goto, S. (eds) Information Networking. Networking Technologies for Broadband and Mobile Networks. ICOIN 2004. Lecture Notes in Computer Science, vol 3090. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-25978-7_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-25978-7_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-23034-2

  • Online ISBN: 978-3-540-25978-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics