Mobility

A Comparative Study of Anonymous 802.11 Protocols

Download Now Free registration required

Executive Summary

Many anonymous communication solutions have been proposed to provide anonymous Mobile Ad hoc NETwork (MANET) communications. However, they mainly focus on the routing layer and above to hide the end-to-end traffic patterns. The point-to-point communication relations are often considered as non-critical information in terms of anonymity, which actually exposes the traffic patterns on the PHY/MAC layer. Adversaries may utilize the MAC layer protocol to derive the end-to-end communication relations by using statistical traffic analysis. Unfortunately, the most popular wireless MAC protocol used in MANETs, i.e., IEEE 802.11, will reveal the point-to-point communication relations to attackers.

  • Format: PDF
  • Size: 446.49 KB