DocumentCode :
2437618
Title :
Performance evaluation of anonymous routing protocols in MANETs
Author :
Liu, Jun ; Kong, Jiejun ; Hong, Xiaoyan ; Gerla, Mario
Author_Institution :
Dept. of Comput. Sci., Alabama Univ., Tuscaloosa, AL
Volume :
2
fYear :
2006
fDate :
3-6 April 2006
Firstpage :
646
Lastpage :
651
Abstract :
Mobile ad hoc networks require anonymous communications in order to thwart new wireless passive attacks; and to protect new assets of information such as nodes´ locations, motion patterns, network topology and traffic patterns in addition to conventional identity and message privacy. In particular, in wireless ad hoc networks mobile nodes must rely on ad hoc routing to keep network functional for communication. The transmitted routing messages and cached active routing entries leave plenty of opportunities for eavesdroppers. To address the new challenges, several anonymous routing schemes have been proposed recently. However, in various network scenarios, how the different cryptographic operations impact the routing performance remains unclear. In this paper we investigate the impact from cryptographic operations needed for the anonymous features. The overhead considered includes both increased control packet size and prolonged processing delay. The protocols taken into account include ANODR, AnonDSR, ASR, MASK, and SDAR. We present results based on extensive simulation study. We use the standard/unprotected on-demand scheme AODV in the comparison to show how much cost is paid by each anonymous on-demand scheme. Our simulation study shows that various design choices in anonymous routing indeed trade performance with anonymity protection. We conclude that extensive performance study is needed to evaluate the practicality of any enhancement of these proposed schemes and any new anonymous routing schemes
Keywords :
ad hoc networks; cryptography; mobile radio; routing protocols; telecommunication network topology; telecommunication security; telecommunication traffic; MANET; anonymity protection; anonymous routing protocols; anonymous routing schemes; cached active routing; cryptographic operations; mobile ad hoc networks; network topology; traffic patterns; Cryptography; Delay; Mobile ad hoc networks; Mobile communication; Network topology; Privacy; Protection; Routing protocols; Size control; Telecommunication traffic;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Wireless Communications and Networking Conference, 2006. WCNC 2006. IEEE
Conference_Location :
Las Vegas, NV
ISSN :
1525-3511
Print_ISBN :
1-4244-0269-7
Electronic_ISBN :
1525-3511
Type :
conf
DOI :
10.1109/WCNC.2006.1683545
Filename :
1683545
Link To Document :
بازگشت