Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  A Survey on Traffic Pattern Discovery in Mobile Ad hoc Network  
  Authors : Priyanka Sen; Vaishali Sahare
  Cite as:

 

Mobile Ad-hoc Network (MANET) is type of unguided network whose nodes are self-configuring and connected by wireless links. Anonymity communication is one of the major issues in MANET. Many anonymity enhancing techniques have been introduced based on packet encryption. These were designed for the protection of communication anonymity in mobile ad hoc networks. However, passive statistical traffic analysis attacks that can be vulnerable to MANET. The communication anonymity consists of two aspects: source/destination anonymity and end-to-end anonymity. In order to discover the communication pattern without decrypting the captured packets, this proposed system will be designed. The proposed system will first search the required node by using a heuristic approach. Then statistical traffic analysis will be performed to find the data transmission of the searched node to its neighboring nodes. After performing the statistical traffic analysis, the probability of the searched node being a source or destination will be determined.

 

Published In : IJCSN Journal Volume 4, Issue 1

Date of Publication : February 2015

Pages : 25 - 30

Figures : 04

Tables : --

Publication Link : A Survey on Traffic Pattern Discovery in Mobile Ad hoc Network

 

 

 

Priyanka Sen : received the BE degree in Computer Science and Engineering from Rashtrasant Tukadoji Maharaj Nagpur University in Maharashtra, India in 2013. She is currently working toward the ME degree in Wireless Communication and Computing from Rashtrasant Tukadoji Maharaj Nagpur University in Maharashtra, India. Her research interest includes ad hoc network and mobile ad hoc network security.

Vaishali Sahare : Department of Computer Science and Engineering, RTMNU, G.H Raisoni Institute of Engineering and Technology for Women Nagpur, Maharashtra, India

 

 

 

 

 

 

 

Anonymity Communication

Mobile Ad hoc Network (MANET)

Statistical Traffic Analysis

The proposed system will observe the traffic pattern of the adversary. As nodes are hidden in MANET a heuristic searching algorithm will be applied. This heuristic searching algorithm will be depth first search (DFS). This system will perform statistical traffic analysis to find the data transmission between one to one and one to many nodes. Probability of point to point transmission among receivers will be estimated by point-to-point traffic matrix. Then by calculating multihop traffic and performing probability distribution the traffic pattern will be discovered. This will provide an approximate traffic pattern with approximate source and destination in the network. The proposed system will reduce the issue of anonymous communication in mobile ad hoc network (MANET).

 

 

 

 

 

 

 

 

 

[1] Yang Qin, Dijiang Huang and Bing Li “STARS: A Statistical Traffic Pattern Discovery System for MANETs” IEEE Transactions on Dependable and Secure Computing, Vol. 11, No. 2, March/April 2014. [2] Douglas Kelly, Richard Raines, Rusty Baldwin, Michael Grimaila, and Barry Mullins, “Exploring Extant and Emerging Issues in Anonymous Networks: A Taxonomy and Survey of Protocols and Metrics”, IEEE Communications Surveys & Tutorials, Vol. 14, No. 2, Second Quarter 2012. [3] Lei Liu, Xiaolong Jin, Geyong Min, and Li Xu, “Real- Time Diagnosis of Network Anomaly based on Statistical Traffic Analysis”, IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 2012. [4] Zhilin Zhang and Yu Zhang, “Control Traffic Analysis of On-Demand Routing Protocol in Mobile Ad-hoc Networks”, IEEE Second International Conference on Networking and Distributed Computing, 2011. [5] Y. Liu, R. Zhang, J. Shi, and Y. Zhang, “Traffic Inference in Anonymous MANETs,” Proc. IEEE Seventh Ann. Comm. Soc. Conf. Sensor Mesh and Ad Hoc Comm. and Networks, pp. 1-9, 2010. [6] Stephen Dabideen and J.J. Garcia-Luna-Aceves, “OWL: Towards Scalable Routing In MANETs Using Depth-First Search On Demand”, IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, Oct 2009. [7] Y. Qin and D. Huang, “OLAR: On-Demand Lightweight Anonymous Routing in MANETs,” Proc.Fourth Int’l Conf. Mobile Computing and Ubiquitous Networking, pp. 72-79, 2008. [8] J. Kong, X. Hong, and M. Gerla, “An Identity-Free and On- Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks,” IEEE Trans. Mobile Computing, vol. 6, no. 8, pp.888-902, Aug. 2007. [9] M. Wright, M. Adler, B. Levine, and C. Shields, “The Predecessor Attack: An Analysis of a Threat to Anonymous Communications Systems,” ACM Trans. Information and System Security, vol. 7, no. 4, pp. 489-522, 2004. [10] G. Danezis, “Statistical Disclosure Attacks: Traffic Confirmation in Open Environments,” Proc. Security and Privacy in the Age of Uncertainty, vol. 122, pp. 421-426, 2003. [11] J. Raymond, “Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems,” Proc. Int’l Workshop Designing Privacy Enhancing Technologies: Design Issues in Anonymity Unobservability, pp. 10- 29, 2001.