Papers
Topics
Authors
Recent
Search
2000 character limit reached

Route Extrapolation for Source and Destination Camouflage in Wireless Ad Hoc Networks

Published 28 Aug 2012 in cs.NI and cs.CR | (1208.5569v1)

Abstract: In wireless ad hoc networks, protecting source and destination nodes location privacy is a challenging task due to malicious traffic analysis and privacy attacks. Existing solutions, such as incorporating fake source destination pairs in the network, provide some privacy of real source and destination nodes against attackers. Moreover, ad hoc networks need stronger privacy protection against powerful global attacker which has knowledge of overall network topology and, that can also eavesdrop and visualize network wide data transmissions. In this paper, we present a novel privacy technique, (EXTROUT) Route Extrapolation to camouflage the real source and destination nodes along an extended path in an ad hoc network. We demonstrate that the privacy level achieved with EXTROUT is higher and more effective against a global attacker, when compared to fake source destination nodes privacy scheme.

Citations (4)

Summary

No one has generated a summary of this paper yet.

Paper to Video (Beta)

No one has generated a video about this paper yet.

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.