Abstract—The broadcast nature of the communication channel enables a malicious eavesdropper to gain information about connectivity and active sessions in a multi-hop wireless network. This can be achieved simply by overhearing the transmitted signals over the ether and analyzing their timings. Focusing on techniques that can meet information-theoretic criteria for session anonymity under traffic analysis attacks, we rely on a judicious choice of transmission schedules to conceal multicast or bidirectional unicast sessions from a global eavesdropper at any given point in time. A systematic approach for constructing the aforementioned transmission schedules for arbitrary network topologies is derived from an equivalent coloring problem in an ...
Abstract—We consider the problem of communicating infor-mation over a network secretly and reliably ...
In wireless networks, an attacker can tune a receiver and tap the communication between two nodes. W...
Traffic analysis is a major issue faced in multi-hop wireless networks (MWN) in the case of privacy ...
An onion routing based anonymous communication system is developed to address timing analysis attack...
Transmissions in a wireless network are susceptible to unauthorized traffic analysis by eavesdropper...
Communication protocols based on coded schemes and, in particular, network coding promise increased ...
Abstract—We study the wireless secrecy capacity scaling prob-lem where the question of interest is h...
Systems that provide network traffic anonymity typically focus on wide-area network topologies, and ...
Flow untraceability is one critical requirement for anonymous communication with network coding, whi...
The broadcast nature of the wireless medium jeopardizes secure transmissions. Cryptographic measures...
The identity and/or location of communicating entities in wireless ad hoc networks is extremely impo...
A mobile ad hoc network consists of mobile nodes that can move freely in an open environment. Commun...
Abstract—Wireless Networks are becoming an increasingly important technology that is bringing the wo...
Abstract — The shared wireless medium of mobile ad hoc net-works facilitates passive, adversarial ea...
Abstract: The open nature of the wireless medium leaves it vulnerable to intentional interference at...
Abstract—We consider the problem of communicating infor-mation over a network secretly and reliably ...
In wireless networks, an attacker can tune a receiver and tap the communication between two nodes. W...
Traffic analysis is a major issue faced in multi-hop wireless networks (MWN) in the case of privacy ...
An onion routing based anonymous communication system is developed to address timing analysis attack...
Transmissions in a wireless network are susceptible to unauthorized traffic analysis by eavesdropper...
Communication protocols based on coded schemes and, in particular, network coding promise increased ...
Abstract—We study the wireless secrecy capacity scaling prob-lem where the question of interest is h...
Systems that provide network traffic anonymity typically focus on wide-area network topologies, and ...
Flow untraceability is one critical requirement for anonymous communication with network coding, whi...
The broadcast nature of the wireless medium jeopardizes secure transmissions. Cryptographic measures...
The identity and/or location of communicating entities in wireless ad hoc networks is extremely impo...
A mobile ad hoc network consists of mobile nodes that can move freely in an open environment. Commun...
Abstract—Wireless Networks are becoming an increasingly important technology that is bringing the wo...
Abstract — The shared wireless medium of mobile ad hoc net-works facilitates passive, adversarial ea...
Abstract: The open nature of the wireless medium leaves it vulnerable to intentional interference at...
Abstract—We consider the problem of communicating infor-mation over a network secretly and reliably ...
In wireless networks, an attacker can tune a receiver and tap the communication between two nodes. W...
Traffic analysis is a major issue faced in multi-hop wireless networks (MWN) in the case of privacy ...