2011
DOI: 10.1002/sec.220
|View full text |Cite
|
Sign up to set email alerts
|

Source—destination obfuscation in wireless ad hocnetworks

Abstract: The identity and/or location of communicating entities in wireless ad hoc networks is extremely important due to the potential of their being identified and subsequently subjected to cyber or physical attacks. In this paper, we show that a global attacker who can eavesdrop on the overall data transmissions and count them can simply visualize the transmissions and infer contextual information. Current approaches to obfuscate the locations of source and destinations do not provide protection against such attacks… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 14 publications
(3 citation statements)
references
References 20 publications
0
3
0
Order By: Relevance
“…It is also worth mentioning that wireless networks are also vulnerable to attacks that cannot be prevented using cryptographic protocols, such as: packet dropping [25,26], jamming [27], wormholes [28,29] and localization [30,31].…”
Section: E Hacking Wpa Protected Wifimentioning
confidence: 99%
“…It is also worth mentioning that wireless networks are also vulnerable to attacks that cannot be prevented using cryptographic protocols, such as: packet dropping [25,26], jamming [27], wormholes [28,29] and localization [30,31].…”
Section: E Hacking Wpa Protected Wifimentioning
confidence: 99%
“…The work in [ 44 ] presented an efficient and adaptive mutual authentication framework for real heterogeneous WSN-based applications. It is also worth mentioning that MSNs are also vulnerable to attacks that cannot be prevented using cryptographic protocols, such as: jamming [ 45 ], packet dropping [ 46 , 47 ], wormholes [ 48 , 49 ] and localization [ 50 , 51 ].…”
Section: Related Workmentioning
confidence: 99%
“…Similar to the model considered in other papers [8]- [10], the adversary is assumed to be capable of conducting global eavesdroppers and the behavior of adversary is external, passive. Global eavesdropper means the adversary has a global view of the whole network topology and can simultaneously monitor all communication patterns of all participants.…”
Section: B Adversary Modelmentioning
confidence: 99%