SECURITY AND COMMUNICATION NETWORKS
Security Comm. Networks. 2009; 2:580–594
Published online 4 February 2009 in Wiley InterScience
(www.interscience.wiley.com) DOI: 10.1002/sec.101
Using camouflaging mobility to protect privacy in mobile
ad hoc networks
‡
Lei Tang
1∗,†
, Xiaoyan Hong
2
and Susan Vrbsky
2
1
Department of Computer Science, Rice University, Houston, TX 77005, U.S.A.
2
Department of Computer Science, University of Alabama, Tuscaloosa, AL 35487, U.S.A.
Summary
The open nature of wireless medium has left wireless communications vulnerable to various privacy attacks. Much
research work has been proposed to protect the identity anonymity of communicating parties, the anonymity of
network routes and the location privacy of the message source and destination. However, with the advent of new
radio identification and localization techniques, more advanced privacy attacks are possible. We describe a new
privacy attack in which the adversary tries to infer the itineraries of the nodes in the network. To protect itinerary
privacy, we design an algorithm, called -camouflaging mobility algorithm, which changes the original motion
segments of a node into -shaped camouflaging paths. Itinerary privacy, correspondent privacy, and route privacy
are closely related so we propose a comprehensive anonymous routing scheme, called MARS, to protect these privacy
goals. MARS exploits camouflaging mobility to protect itinerary privacy and uses motion pseudonyms generated
from the camouflaging mobility to protect correspondent privacy and route privacy without using cryptography.
Our analysis results show that -camouflaging mobility algorithm is cost-effective, which can significantly reduce
the itinerary exposure probability at a small cost of extra travel distance. Moreover, our network simulation results
illustrated that MARS anonymous routing scheme and -camouflaging mobility algorithm did not reduce network
layer performance. Copyright © 2009 John Wiley & Sons, Ltd.
KEY WORDS: itinerary privacy; camouflaging mobility; anonymous routing; correspondent privacy; mobile
ad-hoc networks
1. Introduction
Privacy issues are becoming increasingly important
for mobile ad hoc network (MANET) wireless
communications. Adversaries in the network are able
to eavesdrop on wireless communications to obtain the
∗
Correspondence to: Lei Tang, Department of Computer Science, Rice University, Houston, TX 77005, U.S.A.
†
E-mail: ltang@rice.edu
‡
Part of this paper was presented in the IEEE WoWMoM 08, Workshop on Security, Privacy, and Authentication in Wireless
Networks, Newport Beach, CA, 23–27 June 2008.
information interested, for example, the IP addresses
of message source and destination. Many privacy
preserving schemes [1--6] have been proposed to
address correspondent privacy, route privacy and
location privacy. The objective of correspondent
privacy is to prevent adversaries from discovering who
Copyright © 2009 John Wiley & Sons, Ltd.