WAR: Wireless Anonymous Routing
- Cite this paper as:
- Blaze M., Ioannidis J., Keromytis A.D., Malkin T., Rubin A. (2005) WAR: Wireless Anonymous Routing. In: Christianson B., Crispo B., Malcolm J.A., Roe M. (eds) Security Protocols. Security Protocols 2003. Lecture Notes in Computer Science, vol 3364. Springer, Berlin, Heidelberg
There have been many efforts to anonymize traffic in traditional point-to-point networks. However, these techniques do not map directly onto wireless systems because the two types of networks have different properties. For example, whereas in wired networks adjacent communication links must know each others’ addresses, wireless networks broadcast messages. Thus, an adversary may be able to obtain global information about network traffic. On the other hand, a wireless receiver’s identity may not need to be known to anyone.
We introduce Wireless Anonymous Routing (WAR).We describe a threat model for WAR and compare it to its wired counterpart. We show that traditional anonymity protocols are either insecure or perform poorly when applied to the wireless model, and we describe new protocols that preserve security with better performance.
Unable to display preview. Download preview PDF.