TY - GEN
T1 - Refining traffic information for analysis using evidence theory
AU - Li, Bing
AU - Huang, Dijiang
AU - Wang, Zhijie
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2014/11/13
Y1 - 2014/11/13
N2 - Anonymous communication is important and desirable in a wide range of networking systems to guarantee secure and private communications. This feature is especially important in mobile ad hoc networks (MANETs) where the communication channel is publicly open and the sessions are vulnerable to passive attacks. The fact that MANETs are mostly used in crucial environments such as military usage and disaster rescue emphasizes this importance. In our previous work [1], [2], a theoretic approach and its evaluation methods were developed to model the anonymity performance. The corresponding methods for handling localization errors and scalability issues were also proposed. However, an effective approach to handle the fuzzy information acquired from the network needs to be further developed. To this end, we develop a comprehensive evidence based method to handle the information that a monitoring system can acquire in realistic model and the corresponding analysis approach to process the various evidences from multiple sources. The purpose of this work is to evaluate how much information regarding the anonymous communication is leaked into the wireless channel. The evaluation of the proposed method shows a satisfactory performance in terms of accuracy in reconstructing the anonymous communication patterns in real-world scenarios.
AB - Anonymous communication is important and desirable in a wide range of networking systems to guarantee secure and private communications. This feature is especially important in mobile ad hoc networks (MANETs) where the communication channel is publicly open and the sessions are vulnerable to passive attacks. The fact that MANETs are mostly used in crucial environments such as military usage and disaster rescue emphasizes this importance. In our previous work [1], [2], a theoretic approach and its evaluation methods were developed to model the anonymity performance. The corresponding methods for handling localization errors and scalability issues were also proposed. However, an effective approach to handle the fuzzy information acquired from the network needs to be further developed. To this end, we develop a comprehensive evidence based method to handle the information that a monitoring system can acquire in realistic model and the corresponding analysis approach to process the various evidences from multiple sources. The purpose of this work is to evaluate how much information regarding the anonymous communication is leaked into the wireless channel. The evaluation of the proposed method shows a satisfactory performance in terms of accuracy in reconstructing the anonymous communication patterns in real-world scenarios.
UR - http://www.scopus.com/inward/record.url?scp=84912520943&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84912520943&partnerID=8YFLogxK
U2 - 10.1109/MILCOM.2014.198
DO - 10.1109/MILCOM.2014.198
M3 - Conference contribution
AN - SCOPUS:84912520943
T3 - Proceedings - IEEE Military Communications Conference MILCOM
SP - 1181
EP - 1186
BT - Proceedings - 2014 IEEE Military Communications Conference
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 33rd Annual IEEE Military Communications Conference, MILCOM 2014
Y2 - 6 October 2014 through 8 October 2014
ER -