Download now Free registration required
Many anonymous communication solutions have been proposed to provide anonymous Mobile Ad hoc NETwork (MANET) communications. However, they mainly focus on the routing layer and above to hide the end-to-end traffic patterns. The point-to-point communication relations are often considered as non-critical information in terms of anonymity, which actually exposes the traffic patterns on the PHY/MAC layer. Adversaries may utilize the MAC layer protocol to derive the end-to-end communication relations by using statistical traffic analysis. Unfortunately, the most popular wireless MAC protocol used in MANETs, i.e., IEEE 802.11, will reveal the point-to-point communication relations to attackers.
- Format: PDF
- Size: 446.49 KB