conference paper
Towards Unconditional Tor-Like Anonymity
2015
2015 International Symposium on Network Coding (NetCod)
We design and evaluate a traffic anonymization protocol for wireless networks, aiming to protect against computationally powerful adversaries. Our protocol builds on recent key-generation techniques, that leverage intrinsic properties of the wireless together with standard coding techniques. We show how to exploit the security properties of such keys to design a Tor-like anonymity network, without making any assumptions about the computational capabilities of an adversary. Our analysis and evaluation on simulated ad-hoc wireless networks, shows that our protocol achieves a level of anonymity comparable to the level of the Tor network.
Type
conference paper
Author(s)
Date Issued
2015
Published in
2015 International Symposium on Network Coding (NetCod)
Start page
66
End page
70
Editorial or Peer reviewed
NON-REVIEWED
Written at
EPFL
| Event name | Event place | Event date |
Sydney, Australia | June 22-24, 2015 | |
Available on Infoscience
July 2, 2015
Use this identifier to reference this record