• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

On Providing Anonymity in Ad Hoc Networks


Seung-Seok Kang, Journal of Internet Computing and Services, Vol. 8, No. 4, pp. 93-104, Aug. 2007
Full Text:
Keywords: anonymous communication, ad hoc network, dual channel, traffic analysis

Abstract

Networking environments are exposed to outside attacks and privacy threats. Due to broadcast nature of radio transmissions, wireless devices experience more vulnerable situations than those of wired network devices. This paper assumes that a wireless device has two network interfaces, one for accessing internet using 3G services, and the other for constructing an ad hoc network. To deal with privacy threats, this paper introduces an approach in which wireless devices form a special ad hoc network in order to exchange data using anonymous communications. One or more intermediate peers should be involved in the construction of an anonymous path. The proposed anonymous communication mechanism discourages traffic analysis and improves user privacy. According to simulation results, the anonymous connection in an ad hoc network prefers the intermediate peer(s) which is located near the source and/or the destination peer, rather than randomly-selected peers.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[APA Style]
Kang, S. (2007). On Providing Anonymity in Ad Hoc Networks. Journal of Internet Computing and Services, 8(4), 93-104.

[IEEE Style]
S. Kang, "On Providing Anonymity in Ad Hoc Networks," Journal of Internet Computing and Services, vol. 8, no. 4, pp. 93-104, 2007.

[ACM Style]
Seung-Seok Kang. 2007. On Providing Anonymity in Ad Hoc Networks. Journal of Internet Computing and Services, 8, 4, (2007), 93-104.