作者: Matt Blaze , John Ioannidis , Angelos D. Keromytis , Tal Malkin , Avi Rubin
DOI: 10.1007/11542322_27
关键词: Wireless network 、 Computer security 、 Heterogeneous network 、 Municipal wireless network 、 Computer science 、 Wireless distribution system 、 Wi-Fi array 、 Key distribution in wireless sensor networks 、 Wireless ad hoc network 、 Wireless WAN 、 Computer network
摘要: There have been many efforts to anonymize traffic in traditional point-to-point networks. However, these techniques do not map directly onto wireless systems because the two types of networks different properties. For example, whereas wired adjacent communication links must know each others' addresses, broadcast messages. Thus, an adversary may be able obtain global information about network traffic. On other hand, a receiver's identity need known anyone. We introduce Wireless Anonymous Routing (WAR).We describe threat model for WAR and compare it its counterpart. We show that anonymity protocols are either insecure or perform poorly when applied model, we new preserve security with better performance.