Transmissions in a wireless network are susceptible to unauthorized traffic analysis by eavesdroppers. Although cryptography can protect the contents of communication, the transmission times of packets alone can provide significant networking information. This article focuses on analytical approaches to anonymous networking for the prevention of timing based traffic analysis. In particular, we propose an analytical measure for anonymity, and develop provably anonymous countermeasures for wireless ad hoc and sensor networks, where traffic is subjected to tight constraints on medium access and latency. A key objective is to bridge a long standing gap between the information theoretic approach to secrecy in communication and a more pragmatic a...
The goal of anonymity providing techniques is to preserve the privacy of users, who has communicated...
The goal of anonymity providing techniques is to preserve the privacy of users, who has communicated...
The recent progress in embedded real-time system develop-ment has realized mobile traffic sensors, f...
Systems that provide network traffic anonymity typically focus on wide-area network topologies, and ...
We propose a class of anonymity attacks to both wired and wireless anonymity networks. These attacks...
A mobile ad-hoc network (MANET) is a self-arranged network that consists of mobile routers connected...
Abstract—The open wireless medium in a mobile ad-hoc net-work (MANET) enables malicious traffic anal...
A mobile ad hoc network consists of mobile nodes that can move freely in an open environment. Commun...
Abstract—The broadcast nature of the communication channel enables a malicious eavesdropper to gain ...
Intruders often want to analyze traffic pattern to get information for his some malicious activities...
Abstract — Communication anonymity includes sender anonymity, recipient anonymity and channel anonym...
In ad hoc networks every device is responsible for its own basic computer services, including packet...
A zone-based anonymous positioning routing protocol for ad hoc networks, enabling anonymity of both ...
Mix networks and anonymity networks provide anonymous communication via relaying, which introduces o...
Thesis (Ph.D.)--University of Washington, 2015In applications requiring anonymity such as electronic...
The goal of anonymity providing techniques is to preserve the privacy of users, who has communicated...
The goal of anonymity providing techniques is to preserve the privacy of users, who has communicated...
The recent progress in embedded real-time system develop-ment has realized mobile traffic sensors, f...
Systems that provide network traffic anonymity typically focus on wide-area network topologies, and ...
We propose a class of anonymity attacks to both wired and wireless anonymity networks. These attacks...
A mobile ad-hoc network (MANET) is a self-arranged network that consists of mobile routers connected...
Abstract—The open wireless medium in a mobile ad-hoc net-work (MANET) enables malicious traffic anal...
A mobile ad hoc network consists of mobile nodes that can move freely in an open environment. Commun...
Abstract—The broadcast nature of the communication channel enables a malicious eavesdropper to gain ...
Intruders often want to analyze traffic pattern to get information for his some malicious activities...
Abstract — Communication anonymity includes sender anonymity, recipient anonymity and channel anonym...
In ad hoc networks every device is responsible for its own basic computer services, including packet...
A zone-based anonymous positioning routing protocol for ad hoc networks, enabling anonymity of both ...
Mix networks and anonymity networks provide anonymous communication via relaying, which introduces o...
Thesis (Ph.D.)--University of Washington, 2015In applications requiring anonymity such as electronic...
The goal of anonymity providing techniques is to preserve the privacy of users, who has communicated...
The goal of anonymity providing techniques is to preserve the privacy of users, who has communicated...
The recent progress in embedded real-time system develop-ment has realized mobile traffic sensors, f...