A comparative study of anonymous 802.11 protocols

Yang Qin, Yin Yin, Dijiang Huang, Nirav Shah

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Many anonymous communication solutions have been proposed to provide anonymous mobile ad hoc network (MANET) communications. However, they mainly focus on the routing layer and above to hide the end-to-end traffic patterns. The point-to-point communication relations are often considered as non-critical information in terms of anonymity, which actually exposes the traffic patterns on the PHY/MAC layer. Adversaries may utilize the MAC layer protocol to derive the end-to-end communication relations by using statistical traffic analysis. Unfortunately, the most popular wireless MAC protocol used in MANETs, i.e., IEEE 802.11, will reveal the point-to-point communication relations to attackers. In this paper, we investigate several solutions to hide the 802.11 point-to-point communication relation. We perform a comparative study to analyze the feasibility of these potential solutions. Our research results indicate that the pure physical carrier sensing approximately archives the similar performance compared to the standard 802.11 protocols, while achieving better point-to-point anonymity.

Original languageEnglish (US)
Title of host publicationProceedings - IEEE Military Communications Conference MILCOM
DOIs
StatePublished - 2008
Event2008 IEEE Military Communications Conference, MILCOM 2008 - Assuring Mission Success - Washington, DC, United States
Duration: Nov 17 2008Nov 19 2008

Other

Other2008 IEEE Military Communications Conference, MILCOM 2008 - Assuring Mission Success
CountryUnited States
CityWashington, DC
Period11/17/0811/19/08

Fingerprint

Communication
Mobile ad hoc networks
Telecommunication traffic

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Cite this

Qin, Y., Yin, Y., Huang, D., & Shah, N. (2008). A comparative study of anonymous 802.11 protocols. In Proceedings - IEEE Military Communications Conference MILCOM [4753626] https://doi.org/10.1109/MILCOM.2008.4753626

A comparative study of anonymous 802.11 protocols. / Qin, Yang; Yin, Yin; Huang, Dijiang; Shah, Nirav.

Proceedings - IEEE Military Communications Conference MILCOM. 2008. 4753626.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Qin, Y, Yin, Y, Huang, D & Shah, N 2008, A comparative study of anonymous 802.11 protocols. in Proceedings - IEEE Military Communications Conference MILCOM., 4753626, 2008 IEEE Military Communications Conference, MILCOM 2008 - Assuring Mission Success, Washington, DC, United States, 11/17/08. https://doi.org/10.1109/MILCOM.2008.4753626
Qin Y, Yin Y, Huang D, Shah N. A comparative study of anonymous 802.11 protocols. In Proceedings - IEEE Military Communications Conference MILCOM. 2008. 4753626 https://doi.org/10.1109/MILCOM.2008.4753626
Qin, Yang ; Yin, Yin ; Huang, Dijiang ; Shah, Nirav. / A comparative study of anonymous 802.11 protocols. Proceedings - IEEE Military Communications Conference MILCOM. 2008.
@inproceedings{76f0f53d600c4a07bd505aba8e4e6d2f,
title = "A comparative study of anonymous 802.11 protocols",
abstract = "Many anonymous communication solutions have been proposed to provide anonymous mobile ad hoc network (MANET) communications. However, they mainly focus on the routing layer and above to hide the end-to-end traffic patterns. The point-to-point communication relations are often considered as non-critical information in terms of anonymity, which actually exposes the traffic patterns on the PHY/MAC layer. Adversaries may utilize the MAC layer protocol to derive the end-to-end communication relations by using statistical traffic analysis. Unfortunately, the most popular wireless MAC protocol used in MANETs, i.e., IEEE 802.11, will reveal the point-to-point communication relations to attackers. In this paper, we investigate several solutions to hide the 802.11 point-to-point communication relation. We perform a comparative study to analyze the feasibility of these potential solutions. Our research results indicate that the pure physical carrier sensing approximately archives the similar performance compared to the standard 802.11 protocols, while achieving better point-to-point anonymity.",
author = "Yang Qin and Yin Yin and Dijiang Huang and Nirav Shah",
year = "2008",
doi = "10.1109/MILCOM.2008.4753626",
language = "English (US)",
isbn = "9781424426775",
booktitle = "Proceedings - IEEE Military Communications Conference MILCOM",

}

TY - GEN

T1 - A comparative study of anonymous 802.11 protocols

AU - Qin, Yang

AU - Yin, Yin

AU - Huang, Dijiang

AU - Shah, Nirav

PY - 2008

Y1 - 2008

N2 - Many anonymous communication solutions have been proposed to provide anonymous mobile ad hoc network (MANET) communications. However, they mainly focus on the routing layer and above to hide the end-to-end traffic patterns. The point-to-point communication relations are often considered as non-critical information in terms of anonymity, which actually exposes the traffic patterns on the PHY/MAC layer. Adversaries may utilize the MAC layer protocol to derive the end-to-end communication relations by using statistical traffic analysis. Unfortunately, the most popular wireless MAC protocol used in MANETs, i.e., IEEE 802.11, will reveal the point-to-point communication relations to attackers. In this paper, we investigate several solutions to hide the 802.11 point-to-point communication relation. We perform a comparative study to analyze the feasibility of these potential solutions. Our research results indicate that the pure physical carrier sensing approximately archives the similar performance compared to the standard 802.11 protocols, while achieving better point-to-point anonymity.

AB - Many anonymous communication solutions have been proposed to provide anonymous mobile ad hoc network (MANET) communications. However, they mainly focus on the routing layer and above to hide the end-to-end traffic patterns. The point-to-point communication relations are often considered as non-critical information in terms of anonymity, which actually exposes the traffic patterns on the PHY/MAC layer. Adversaries may utilize the MAC layer protocol to derive the end-to-end communication relations by using statistical traffic analysis. Unfortunately, the most popular wireless MAC protocol used in MANETs, i.e., IEEE 802.11, will reveal the point-to-point communication relations to attackers. In this paper, we investigate several solutions to hide the 802.11 point-to-point communication relation. We perform a comparative study to analyze the feasibility of these potential solutions. Our research results indicate that the pure physical carrier sensing approximately archives the similar performance compared to the standard 802.11 protocols, while achieving better point-to-point anonymity.

UR - http://www.scopus.com/inward/record.url?scp=78650758890&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=78650758890&partnerID=8YFLogxK

U2 - 10.1109/MILCOM.2008.4753626

DO - 10.1109/MILCOM.2008.4753626

M3 - Conference contribution

AN - SCOPUS:78650758890

SN - 9781424426775

BT - Proceedings - IEEE Military Communications Conference MILCOM

ER -