WAR: Wireless Anonymous Routing

作者: Matt Blaze , John Ioannidis , Angelos D. Keromytis , Tal Malkin , Avi Rubin

DOI: 10.1007/11542322_27

关键词: Wireless networkComputer securityHeterogeneous networkMunicipal wireless networkComputer scienceWireless distribution systemWi-Fi arrayKey distribution in wireless sensor networksWireless ad hoc networkWireless WANComputer network

摘要: There have been many efforts to anonymize traffic in traditional point-to-point networks. However, these techniques do not map directly onto wireless systems because the two types of networks different properties. For example, whereas wired adjacent communication links must know each others' addresses, broadcast messages. Thus, an adversary may be able obtain global information about network traffic. On other hand, a receiver's identity need known anyone. We introduce Wireless Anonymous Routing (WAR).We describe threat model for WAR and compare it its counterpart. We show that anonymity protocols are either insecure or perform poorly when applied model, we new preserve security with better performance.

参考文章(40)
Bernard Jouga, Ricardo Staciarini Puttini, Patrick Albers, Jean-Marc Percher, Ludovic Mé, Olivier Camp, Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches. Wireless Information Systems. pp. 1- 12 ,(2002)
A. Fasbender, D. Kesdogan, O. Kubitz, Variable and scalable security: protection of location information in mobile IP vehicular technology conference. ,vol. 2, pp. 963- 967 ,(1996) , 10.1109/VETEC.1996.501454
Stefan Savage, John Bellardo, 802.11 denial-of-service attacks: real vulnerabilities and practical solutions usenix security symposium. pp. 2- 2 ,(2003)
David Goldschlag, Paul Syverson, Michael Reed, Onion Routing for Anonymous and Private Internet Connections ,(1999)
Ran Canetti, Amir Herzberg, None, Maintaining Security in the Presence of Transient Faults international cryptology conference. pp. 425- 438 ,(1994) , 10.1007/3-540-48658-5_38
Andreas Pfitzmann, Michael Waidner, Birgit Pfitzmann, ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead kommunikation in verteilten systemen. pp. 451- 463 ,(1991)
H.T. Kung, S. Bradner, K.-S. Tan, An IP-layer anonymizing infrastructure military communications conference. ,vol. 1, pp. 389- 394 ,(2002) , 10.1109/MILCOM.2002.1180473
Aggelos Kiayias, Moti Yung, Traitor Tracing with Constant Transmission Rate international cryptology conference. pp. 450- 465 ,(2002) , 10.1007/3-540-46035-7_30
Michael J. Freedman, Emil Sit, Josh Cates, Robert Morris, Introducing Tarzan, a Peer-to-Peer Anonymizing Network Layer international workshop on peer to peer systems. pp. 121- 129 ,(2002) , 10.1007/3-540-45748-8_12
C. Gulcu, G. Tsudik, Mixing E-mail with Babel network and distributed system security symposium. pp. 2- 16 ,(1996) , 10.1109/NDSS.1996.492350