Mobile Ad-hoc Network (MANET) is type of
unguided network whose nodes are self-configuring and
connected by wireless links. Anonymity communication is one of
the major issues in MANET. Many anonymity enhancing
techniques have been introduced based on packet encryption.
These were designed for the protection of communication
anonymity in mobile ad hoc networks. However, passive
statistical traffic analysis attacks that can be vulnerable to
MANET. The communication anonymity consists of two aspects:
source/destination anonymity and end-to-end anonymity. In order
to discover the communication pattern without decrypting the
captured packets, this proposed system will be designed. The
proposed system will first search the required node by using a
heuristic approach. Then statistical traffic analysis will be
performed to find the data transmission of the searched node to
its neighboring nodes. After performing the statistical traffic
analysis, the probability of the searched node being a source or
destination will be determined.
Priyanka Sen : received the BE degree in Computer Science and
Engineering from Rashtrasant Tukadoji Maharaj Nagpur University
in Maharashtra, India in 2013. She is currently working toward the
ME degree in Wireless Communication and Computing from
Rashtrasant Tukadoji Maharaj Nagpur University in Maharashtra,
India. Her research interest includes ad hoc network and mobile
ad hoc network security.
Vaishali Sahare : Department of Computer Science and Engineering, RTMNU,
G.H Raisoni Institute of Engineering and Technology for Women
Nagpur, Maharashtra, India
Anonymity Communication
Mobile Ad hoc
Network (MANET)
Statistical Traffic Analysis
The proposed system will observe the traffic pattern of the
adversary. As nodes are hidden in MANET a heuristic
searching algorithm will be applied. This heuristic
searching algorithm will be depth first search (DFS). This
system will perform statistical traffic analysis to find the
data transmission between one to one and one to many
nodes. Probability of point to point transmission among
receivers will be estimated by point-to-point traffic matrix.
Then by calculating multihop traffic and performing
probability distribution the traffic pattern will be
discovered. This will provide an approximate traffic
pattern with approximate source and destination in the
network. The proposed system will reduce the issue of
anonymous communication in mobile ad hoc network
(MANET).
[1] Yang Qin, Dijiang Huang and Bing Li “STARS: A
Statistical Traffic Pattern Discovery System for
MANETs” IEEE Transactions on Dependable and
Secure Computing, Vol. 11, No. 2, March/April 2014.
[2] Douglas Kelly, Richard Raines, Rusty Baldwin,
Michael Grimaila, and Barry Mullins, “Exploring
Extant and Emerging Issues in Anonymous Networks:
A Taxonomy and Survey of Protocols and Metrics”,
IEEE Communications Surveys & Tutorials, Vol. 14,
No. 2, Second Quarter 2012.
[3] Lei Liu, Xiaolong Jin, Geyong Min, and Li Xu, “Real-
Time Diagnosis of Network Anomaly based on
Statistical Traffic Analysis”, IEEE 11th International
Conference on Trust, Security and Privacy in
Computing and Communications, 2012.
[4] Zhilin Zhang and Yu Zhang, “Control Traffic Analysis
of On-Demand Routing Protocol in Mobile Ad-hoc
Networks”, IEEE Second International Conference on
Networking and Distributed Computing, 2011.
[5] Y. Liu, R. Zhang, J. Shi, and Y. Zhang, “Traffic
Inference in Anonymous MANETs,” Proc. IEEE
Seventh Ann. Comm. Soc. Conf. Sensor Mesh and Ad
Hoc Comm. and Networks, pp. 1-9, 2010.
[6] Stephen Dabideen and J.J. Garcia-Luna-Aceves,
“OWL: Towards Scalable Routing In MANETs Using
Depth-First Search On Demand”, IEEE 6th
International Conference on Mobile Adhoc and Sensor
Systems, Oct 2009.
[7] Y. Qin and D. Huang, “OLAR: On-Demand
Lightweight Anonymous Routing in MANETs,”
Proc.Fourth Int’l Conf. Mobile Computing and
Ubiquitous Networking, pp. 72-79, 2008.
[8] J. Kong, X. Hong, and M. Gerla, “An Identity-Free and
On- Demand Routing Scheme against Anonymity
Threats in Mobile Ad Hoc Networks,” IEEE Trans.
Mobile Computing, vol. 6, no. 8, pp.888-902, Aug.
2007.
[9] M. Wright, M. Adler, B. Levine, and C. Shields, “The
Predecessor Attack: An Analysis of a Threat to
Anonymous Communications Systems,” ACM Trans.
Information and System Security, vol. 7, no. 4, pp.
489-522, 2004.
[10] G. Danezis, “Statistical Disclosure Attacks: Traffic
Confirmation in Open Environments,” Proc. Security
and Privacy in the Age of Uncertainty, vol. 122, pp.
421-426, 2003.
[11] J. Raymond, “Traffic Analysis: Protocols, Attacks,
Design Issues, and Open Problems,” Proc. Int’l
Workshop Designing Privacy Enhancing Technologies:
Design Issues in Anonymity Unobservability, pp. 10-
29, 2001.