A comparative study of anonymous 802.11 protocols

Yang Qin, Yin Yin, Dijiang Huang, Nirav Shah

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Abstract

Many anonymous communication solutions have been proposed to provide anonymous mobile ad hoc network (MANET) communications. However, they mainly focus on the routing layer and above to hide the end-to-end traffic patterns. The point-to-point communication relations are often considered as non-critical information in terms of anonymity, which actually exposes the traffic patterns on the PHY/MAC layer. Adversaries may utilize the MAC layer protocol to derive the end-to-end communication relations by using statistical traffic analysis. Unfortunately, the most popular wireless MAC protocol used in MANETs, i.e., IEEE 802.11, will reveal the point-to-point communication relations to attackers. In this paper, we investigate several solutions to hide the 802.11 point-to-point communication relation. We perform a comparative study to analyze the feasibility of these potential solutions. Our research results indicate that the pure physical carrier sensing approximately archives the similar performance compared to the standard 802.11 protocols, while achieving better point-to-point anonymity.

Original languageEnglish (US)
Title of host publication2008 IEEE Military Communications Conference, MILCOM 2008 - Assuring Mission Success
DOIs
StatePublished - 2008
Event2008 IEEE Military Communications Conference, MILCOM 2008 - Assuring Mission Success - Washington, DC, United States
Duration: Nov 17 2008Nov 19 2008

Publication series

NameProceedings - IEEE Military Communications Conference MILCOM

Other

Other2008 IEEE Military Communications Conference, MILCOM 2008 - Assuring Mission Success
Country/TerritoryUnited States
CityWashington, DC
Period11/17/0811/19/08

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'A comparative study of anonymous 802.11 protocols'. Together they form a unique fingerprint.

Cite this