DocumentCode :
153887
Title :
Refining Traffic Information for Analysis Using Evidence Theory
Author :
Bing Li ; Dijiang Huang ; Zhijie Wang
Author_Institution :
Sch. of Comput. Inf. & Decision Syst. Eng., Arizona State Univ., Tempe, AZ, USA
fYear :
2014
fDate :
6-8 Oct. 2014
Firstpage :
1181
Lastpage :
1186
Abstract :
Anonymous communication is important and desirable in a wide range of networking systems to guarantee secure and private communications. This feature is especially important in mobile ad hoc networks (MANETs) where the communication channel is publicly open and the sessions are vulnerable to passive attacks. The fact that MANETs are mostly used in crucial environments such as military usage and disaster rescue emphasizes this importance. In our previous work [1], [2], a theoretic approach and its evaluation methods were developed to model the anonymity performance. The corresponding methods for handling localization errors and scalability issues were also proposed. However, an effective approach to handle the fuzzy information acquired from the network needs to be further developed. To this end, we develop a comprehensive evidence based method to handle the information that a monitoring system can acquire in realistic model and the corresponding analysis approach to process the various evidences from multiple sources. The purpose of this work is to evaluate how much information regarding the anonymous communication is leaked into the wireless channel. The evaluation of the proposed method shows a satisfactory performance in terms of accuracy in reconstructing the anonymous communication patterns in real-world scenarios.
Keywords :
fuzzy set theory; mobile ad hoc networks; telecommunication security; telecommunication traffic; wireless channels; MANETs; anonymity performance; anonymous communication patterns; communication channel; comprehensive evidence based method; disaster rescue; evidence theory; fuzzy information; localization error handling; military usage; mobile ad hoc networks; monitoring system; networking systems; passive attacks; private communications; scalability issues; secure communications; traffic information refinement; wireless channel; Ad hoc networks; Mobile computing; Mobile nodes; Monitoring; Sensor systems;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Military Communications Conference (MILCOM), 2014 IEEE
Conference_Location :
Baltimore, MD
Type :
conf
DOI :
10.1109/MILCOM.2014.198
Filename :
6956918
Link To Document :
بازگشت