Towards Unconditional Tor-Like Anonymity

We design and evaluate a traffic anonymization protocol for wireless networks, aiming to protect against computationally powerful adversaries. Our protocol builds on recent key-generation techniques, that leverage intrinsic properties of the wireless together with standard coding techniques. We show how to exploit the security properties of such keys to design a Tor-like anonymity network, without making any assumptions about the computational capabilities of an adversary. Our analysis and evaluation on simulated ad-hoc wireless networks, shows that our protocol achieves a level of anonymity comparable to the level of the Tor network.


Presented at:
The 2015 IEEE International Sumposium on Network Coding (NetCod) - Invited Paper, Sydney, Australia, June 22-24, 2015
Year:
2015
Laboratories:




 Record created 2015-07-02, last modified 2018-03-18

Publisher's version:
Download fulltext
PDF

Rate this document:

Rate this document:
1
2
3
 
(Not yet reviewed)