Mobility

Using Camouflaging Mobility to Protect Privacy in Mobile Ad Hoc Networks

Free registration required

Executive Summary

The open nature of wireless medium has left wireless communications vulnerable to various privacy attacks. Much research work has been proposed to protect the identity anonymity of communicating parties, the anonymity of network routes and the location privacy of the message source and destination. However, with the advent of new radio identification and localization techniques, more advanced privacy attacks are possible. The authors describe a new privacy attack in which the adversary tries to infer the itineraries of the nodes in the network.

  • Format: PDF
  • Size: 434.3 KB