• DocumentCode
    2285267
  • Title

    A dynamic mix method for wireless ad hoc networks

  • Author

    Jiang, Shu ; Vaidya, Nitin H. ; Zhao, Wei

  • Author_Institution
    Dept. of Comput. Sci., Texas A&M Univ., College Station, TX, USA
  • Volume
    2
  • fYear
    2001
  • fDate
    2001
  • Firstpage
    873
  • Abstract
    A wireless ad hoc network is subject to various security attacks including traffic analysis. In this paper, we explore the approach of preventing traffic analysis through hiding the source and destination of packets. We argue that Chaum´s (1981) mix method and proposed security schemas (IPSec (Kent et al. (1998)), Onion Routing (Reed et al. (1998)), and Non Disclosure Method (Fasbender et al. (1996))) cannot adapt to the dynamic changes of topology in a wireless ad hoc network and may cause network performance degradation. A dynamic mix method is proposed which attempts to improve the network performance while still hiding the source and destination of packets.
  • Keywords
    cryptography; military communication; mobile computing; mobile radio; network topology; packet radio networks; performance evaluation; telecommunication security; telecommunication traffic; Chaum mix method; IPSec; Non Disclosure Method; Onion Routing; dynamic mix method; dynamic topology changes; network performance degradation; packet destination hiding; security attacks; security schemas; source hiding; traffic analysis; wireless ad hoc network; Ad hoc networks; Communication system security; Cryptography; Data security; Degradation; Mobile ad hoc networks; Network topology; Radio frequency; Routing; Telecommunication traffic;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Military Communications Conference, 2001. MILCOM 2001. Communications for Network-Centric Operations: Creating the Information Force. IEEE
  • Print_ISBN
    0-7803-7225-5
  • Type

    conf

  • DOI
    10.1109/MILCOM.2001.985964
  • Filename
    985964