A-WEOR: Communication privacy protection for wireless mesh networks using encoded opportunistic routing

Nirav Shah, Dijiang Huang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Abstract

Recent research in the physical and MAC models of IEEE 802.11 has shown that wireless nodes expose traffic patterns at PHY/MAC layers. Adversaries can easily utilize these patterns to derive the end-to-end communication relations using statistical traffic analysis attack. IEEE 802.11 provides MAC layer broadcast capabilities which can be used to protect the flow from such traffic analysis. In this paper, we present a novel approach A-WEOR, utilizing network coding and opportunistic routing to protect the communication patterns for wireless mesh networks. Our evaluation proves that A-WEOR is an efficient solution which achieves exceedingly superior anonymity compared to existing methodologies.

Original languageEnglish (US)
Title of host publicationINFOCOM 2010 - IEEE Conference on Computer Communications Workshops
DOIs
StatePublished - 2010
EventIEEE Conference on Computer Communications Workshops, INFOCOM 2010 - San Diego, CA, United States
Duration: Mar 15 2010Mar 19 2010

Publication series

NameProceedings - IEEE INFOCOM
ISSN (Print)0743-166X

Other

OtherIEEE Conference on Computer Communications Workshops, INFOCOM 2010
Country/TerritoryUnited States
CitySan Diego, CA
Period3/15/103/19/10

Keywords

  • Anonymous routing
  • Network coding
  • Opportunistic routing

ASJC Scopus subject areas

  • General Computer Science
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'A-WEOR: Communication privacy protection for wireless mesh networks using encoded opportunistic routing'. Together they form a unique fingerprint.

Cite this