Wireless Personal Communications

, Volume 97, Issue 3, pp 4063–4086 | Cite as

Preserving Data Privacy During Data Transfer in MANETs

  • Bhawani Shanker Bhati
  • Pallapa VenkataramEmail author


Mobile adhoc networks consists of large number of mobile nodes, and is usually deployed to transfer data from a sender to a receiver using multi-hop routing. The data being transmitted may contain sensitive information, and undesired disclosure of information can lead to launching of various attacks, thus breaching the data privacy. Earlier works achieve data privacy by using approaches such as data transformation and data perturbation. However, these approaches introduce higher overheads and delays. We propose a computational intelligence based data privacy preserving scheme, where rough set theory is used to anonymize the data during data transfer. Data packets are enclosed within capsules that can be opened only by the designated node, thus preventing the undesired leakage of the data. Also, route between a sender and a receiver is changed dynamically by selecting more than one trusted 1-hop neighbor nodes in each routing step. The proposed data privacy preserving scheme is tested by considering different case studies in a MANET deployed for stock market. Theoretical analysis for data privacy is presented in terms of Information Gain by an attacker and Attacker Overhead, and the performance of proposed scheme against some of the attacks is also discussed. The simulation results show the effectiveness of proposed scheme.


Data privacy Data attributes Rough sets Mobile adhoc network Stock market application 


  1. 1.
    The network simulator ns-2.34 available at:
  2. 2.
    Berman, V., & Mukherjee, B. (2006). Data security in manets using multipath routing and directional transmission. In IEEE International Conference on Communications, 2006. ICC ’06, Vol. 5, (pp. 2322–2328).Google Scholar
  3. 3.
    Bhati, B. S., & Venkataram, P. (2014). Data privacy preserving scheme in MANETs. In World Congress on Internet Security (WorldCIS), 2014, (pp. 22–23).Google Scholar
  4. 4.
    Bhati, B. S., & Venkataram, P. (2016). Performance analysis of location privacy preserving scheme for manets. International Journal of Network Security, 18, 736–749.Google Scholar
  5. 5.
    Charalampos, Z., Patrikakis, D. M. K., & Prasad, N. R. (2009). Establishing trust through anonymous and private information exchange over personal networks. Wireless Personal Communications, Springer, 51, 121–135.CrossRefGoogle Scholar
  6. 6.
    Chen, S., & Wu, M. (2010). Anonymous multipath routing protocol based on secret sharing in mobile ad hoc networks. In International Conference on Measuring Technology and Mechatronics Automation (ICMTMA), 2010, Vol. 1, (pp. 582–585).Google Scholar
  7. 7.
    Aldabbas, H., Alwada, T., Janicke, H., & Al-Bayatti, A. (2012). Data confidentiality in mobile ad hoc networks. International Journal of Wireless and Mobile Networks (IJWMN), 4, 225–236.CrossRefGoogle Scholar
  8. 8.
    Hoebeke, J., Moerman, I., Dhoedt, B., & Demeester, P. (2004). An overview of mobile ad hoc networks: Applications and challenges. Journal of the Communications Network, 3, 60–66.Google Scholar
  9. 9.
    Chlamtac, I., Conti, M., & Liu, J. J. N. (2003). Mobile ad hoc networking: Imperatives and challenges. Ad Hoc Networks, 1, 13–64.CrossRefGoogle Scholar
  10. 10.
    Komorowski, J., Pawlak, Z., Polkowski L., & Skowron, A. (1998). Rough sets: A tutorial.Google Scholar
  11. 11.
    Lim, J., Kim, S., & Oh, H. (2007). A secure location service for ad hoc position-based routing using self-signed locations. In Proceedings of 6th International Conference, CANS, (pp. 121–132).Google Scholar
  12. 12.
    Kumar, A., & Tripathi, S. (2015). A pairing free anonymous certificateless group key agreement protocol for dynamic group. Wireless Personal Communications, Springer, 82, 1027–1045.CrossRefGoogle Scholar
  13. 13.
    Liu, K., Giannella, C., & Kargupta, H. (2008). A survey on attack techniques on privacy-preserving data perturbation methods. Advanced Database System, pp. 359–381.Google Scholar
  14. 14.
    Lou, W., Liu, W., & Fang, Y. (2004). Spread: Enhancing data confidentiality in mobile ad hoc networks. In Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies INFOCOM 2004, Vol. 4, (pp. 2404–2413).Google Scholar
  15. 15.
    Mahesh, R., & Meyyappan, T. (2013). Anonymization technique through record elimination to preserve privacy of published data. In 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME), (pp. 328–332).Google Scholar
  16. 16.
    Mazilu, S., Teler, M., & Dobre, C. (2011). Securing vehicular networks based on data-trust computation. In International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, (pp. 51–58).Google Scholar
  17. 17.
    Kwan, M. P., Casas, I., & Schmitz, B. C. (2004). Protection of geoprivacy and accuracy of spatial information: How effective are geographical masks? Cartographica, 39, 15–28.CrossRefGoogle Scholar
  18. 18.
    Park, M. H., Son, J. H., & Seo, S. W. (2009). Anonymous communication in ubiquitous computing environments. Wireless Personal Communications, Springer, 56, 21–36.CrossRefGoogle Scholar
  19. 19.
    Li, M., Lou, W., & Ren, K. (2010). Data security and privacy in wireless body area networks. IEEE Wireless Communication, 17, 51–58.CrossRefGoogle Scholar
  20. 20.
    Pandey, M., & Verma, S. (2014). Privacy provisioning in wireless sensor networks. Wireless Personal Communications, Springer, 75, 1115–1140.CrossRefGoogle Scholar
  21. 21.
    Pawlak, Z. (1982). Rough sets. International Journal of Computer and Information Sciences, 11, 341–356.MathSciNetCrossRefGoogle Scholar
  22. 22.
    Perkins, C., Belding-Royer, E., & Das, S. (2003). Ad hoc on-demand distance vector (AODV) routing. In RFC 3561.
  23. 23.
    Rangarajan, A., & Vasudevan, S. S. (2004). A novel multipath approach to security in mobile ad hoc networks (MANETS). In International Conference on Computers and Devices for Communication.Google Scholar
  24. 24.
    Raya, M., Papadimitratos, P., Gligor, V. D., & Hubaux, J.-P. (2008). On data-centric trust establishment in ephemeral ad hoc networks. In INFOCOM The 27th Conference on Computer Communications. IEEE.Google Scholar
  25. 25.
    Raymond, J. F. (2000). Traffic analysis: Protocols, attacks, design issues, and open problems. In International Workshop on Design Issues in Anonymity and Unobservability, (pp. 10–29).Google Scholar
  26. 26.
    Shen, H., & Zhao, L. (2013). Alert: An anonymous location-based efficient routing protocol in MANETs. IEEE Transaction on Mobile Computing, 12, 1079–1093.CrossRefGoogle Scholar
  27. 27.
    Su-min, Y., Jie, M., Qi-ming, L., & Kai, W. (2014). A new comprehensive attribute weight algorithm with rough set theory. Journal of Chemical and Pharmaceutical Research, 6, 176–181.Google Scholar
  28. 28.
    Wang, W., & Cui, C. (2008). Achieving configurable location privacy in location based routing for MANET. In Military Communications Conference, (pp. 1–7).Google Scholar
  29. 29.
    Wu, A., Ma, J., & Zhang, S. (2011) Rate: A RSU-aided scheme for data-centric trust establishment in VANETs. In 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), (pp. 1–6).Google Scholar
  30. 30.
    Wu, X. (2006). DISPOSER: Distributed secure position service in mobile ad hoc networks: Research articles. Wireless Communications and Mobile Computing, 6, 357–373.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2017

Authors and Affiliations

  1. 1.Protocol Engineering and Technology Unit, Department of ECEIndian Institute of ScienceBangaloreIndia

Personalised recommendations