Title :
Camouflaging mobility for itinerary privacy in mobile ad-hoc networks
Author :
Tang, Lei ; Hong, Xiaoyan ; Vrbsky, Susan
Author_Institution :
Dept. of Comput. Sci., Univ. of Alabama, Tuscaloosa, AL
Abstract :
The privacy of wireless communications is becoming an important issue due to the open nature of wireless medium. Much research work has been proposed to address the anonymity of communicating parties, the location privacy of the message source and destination, and the privacy of the network routing paths. However, with the advent of new radio identification and localization techniques, more advanced privacy attacks are possible. We describe a new privacy attack in which the adversary tries to infer the itineraries of the nodes in the network. To protect itinerary privacy, we design an algorithm, called the Delta-mobility camouflaging algorithm, which can be applied upon any mobility model by changing the original motion segments into Delta-shaped camouflaging paths. Our analysis results show that the Delta-mobility camouflaging algorithm is cost-effective, which in most cases decreases the itinerary exposure probability more than 80% at a cost of less than 3% extra travel distance.
Keywords :
ad hoc networks; data privacy; mobile radio; telecommunication security; Delta-mobility camouflaging algorithm; itinerary privacy attack; mobile ad-hoc networks; network routing; radio identification; radio localization; wireless communication; Ad hoc networks; Algorithm design and analysis; Cryptography; Mobile computing; Privacy; Protection; Radio transmitters; Routing; Signal processing; Wireless communication;
Conference_Titel :
World of Wireless, Mobile and Multimedia Networks, 2008. WoWMoM 2008. 2008 International Symposium on a
Conference_Location :
Newport Beach, CA
Print_ISBN :
978-1-4244-2099-5
Electronic_ISBN :
978-1-4244-2100-8
DOI :
10.1109/WOWMOM.2008.4594920