A-WEOR: Communication privacy protection for wireless mesh networks using encoded opportunistic routing

Nirav Shah, Dijiang Huang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Recent research in the physical and MAC models of IEEE 802.11 has shown that wireless nodes expose traffic patterns at PHY/MAC layers. Adversaries can easily utilize these patterns to derive the end-to-end communication relations using statistical traffic analysis attack. IEEE 802.11 provides MAC layer broadcast capabilities which can be used to protect the flow from such traffic analysis. In this paper, we present a novel approach A-WEOR, utilizing network coding and opportunistic routing to protect the communication patterns for wireless mesh networks. Our evaluation proves that A-WEOR is an efficient solution which achieves exceedingly superior anonymity compared to existing methodologies.

Original languageEnglish (US)
Title of host publicationProceedings - IEEE INFOCOM
DOIs
StatePublished - 2010
EventIEEE Conference on Computer Communications Workshops, INFOCOM 2010 - San Diego, CA, United States
Duration: Mar 15 2010Mar 19 2010

Other

OtherIEEE Conference on Computer Communications Workshops, INFOCOM 2010
CountryUnited States
CitySan Diego, CA
Period3/15/103/19/10

Fingerprint

Wireless mesh networks (WMN)
Network coding
Communication
Telecommunication traffic

Keywords

  • Anonymous routing
  • Network coding
  • Opportunistic routing

ASJC Scopus subject areas

  • Computer Science(all)
  • Electrical and Electronic Engineering

Cite this

A-WEOR : Communication privacy protection for wireless mesh networks using encoded opportunistic routing. / Shah, Nirav; Huang, Dijiang.

Proceedings - IEEE INFOCOM. 2010. 5466677.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Shah, N & Huang, D 2010, A-WEOR: Communication privacy protection for wireless mesh networks using encoded opportunistic routing. in Proceedings - IEEE INFOCOM., 5466677, IEEE Conference on Computer Communications Workshops, INFOCOM 2010, San Diego, CA, United States, 3/15/10. https://doi.org/10.1109/INFCOMW.2010.5466677
@inproceedings{d4dd01bd907147388bcc564b30748fcb,
title = "A-WEOR: Communication privacy protection for wireless mesh networks using encoded opportunistic routing",
abstract = "Recent research in the physical and MAC models of IEEE 802.11 has shown that wireless nodes expose traffic patterns at PHY/MAC layers. Adversaries can easily utilize these patterns to derive the end-to-end communication relations using statistical traffic analysis attack. IEEE 802.11 provides MAC layer broadcast capabilities which can be used to protect the flow from such traffic analysis. In this paper, we present a novel approach A-WEOR, utilizing network coding and opportunistic routing to protect the communication patterns for wireless mesh networks. Our evaluation proves that A-WEOR is an efficient solution which achieves exceedingly superior anonymity compared to existing methodologies.",
keywords = "Anonymous routing, Network coding, Opportunistic routing",
author = "Nirav Shah and Dijiang Huang",
year = "2010",
doi = "10.1109/INFCOMW.2010.5466677",
language = "English (US)",
isbn = "9781424467396",
booktitle = "Proceedings - IEEE INFOCOM",

}

TY - GEN

T1 - A-WEOR

T2 - Communication privacy protection for wireless mesh networks using encoded opportunistic routing

AU - Shah, Nirav

AU - Huang, Dijiang

PY - 2010

Y1 - 2010

N2 - Recent research in the physical and MAC models of IEEE 802.11 has shown that wireless nodes expose traffic patterns at PHY/MAC layers. Adversaries can easily utilize these patterns to derive the end-to-end communication relations using statistical traffic analysis attack. IEEE 802.11 provides MAC layer broadcast capabilities which can be used to protect the flow from such traffic analysis. In this paper, we present a novel approach A-WEOR, utilizing network coding and opportunistic routing to protect the communication patterns for wireless mesh networks. Our evaluation proves that A-WEOR is an efficient solution which achieves exceedingly superior anonymity compared to existing methodologies.

AB - Recent research in the physical and MAC models of IEEE 802.11 has shown that wireless nodes expose traffic patterns at PHY/MAC layers. Adversaries can easily utilize these patterns to derive the end-to-end communication relations using statistical traffic analysis attack. IEEE 802.11 provides MAC layer broadcast capabilities which can be used to protect the flow from such traffic analysis. In this paper, we present a novel approach A-WEOR, utilizing network coding and opportunistic routing to protect the communication patterns for wireless mesh networks. Our evaluation proves that A-WEOR is an efficient solution which achieves exceedingly superior anonymity compared to existing methodologies.

KW - Anonymous routing

KW - Network coding

KW - Opportunistic routing

UR - http://www.scopus.com/inward/record.url?scp=77953906013&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=77953906013&partnerID=8YFLogxK

U2 - 10.1109/INFCOMW.2010.5466677

DO - 10.1109/INFCOMW.2010.5466677

M3 - Conference contribution

AN - SCOPUS:77953906013

SN - 9781424467396

BT - Proceedings - IEEE INFOCOM

ER -