23-06-2012, 04:14 PM
Secure and Anonymous Mobile Ad-hoc Routing
Secure and Anonymous .ppt (Size: 878.5 KB / Downloads: 38)
The Adversary: Mobile Traffic Sensor
Mobile traffic analyst
Unmanned aerial vehicle (UAV)
Coordinated positioning(tri-lateration / tri-angulation)can reduce venue uncertainty
If moving faster thanthe transmitter, canalways trace the victim
Proactive Routing vs. On-demand Routing
Hiding network topology from adversary
Critical demand in mobile networks. If revealed, adversary knows who is where (via adversarial localization)
Proactive routing schemes vulnerable
In OLSR, each update pkt carries full topology info
Network topology revealed to single adversarial sender
On-Demand routing more robust to motion detection
AODV, DSR etc
Recent Anonymous On-demand Routing
ANODR [MobiHoc’03]: initiates anonymous on-demand routing
MASK [Zhang et al.INFOCOM’05], SDAR [Boukerche et al.,LCN’04]
Like ANODR, route discovery is on-demand
Differs in Key agreement and data delivery
ASR [Zhu et al., LCN’04]
Nearly identical to ANODR, except some minor revisions