Towards unconditional tor-like anonymity

Network Coding(2015)

引用 3|浏览42
暂无评分
摘要
We design and evaluate a traffic anonymization protocol for wireless networks, aiming to protect against computationally powerful adversaries. Our protocol builds on recent key-generation techniques, that leverage intrinsic properties of the wireless together with standard coding techniques. We show how to exploit the security properties of such keys to design a Tor-like anonymity network, without making any assumptions about the computational capabilities of an adversary. Our analysis and evaluation on simulated ad-hoc wireless networks, shows that our protocol achieves a level of anonymity comparable to the level of the Tor network.
更多
查看译文
关键词
ad hoc networks,protocols,Tor-like anonymity,Tor-like anonymity network,ad-hoc wireless networks,intrinsic properties,key generation techniques,standard coding techniques,traffic anonymization protocol,wireless networks
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要