WAR: wireless anonymous routing

  • Authors:
  • Matt Blaze;John Ioannidis;Angelos D. Keromytis;Tal Malkin;Avi Rubin

  • Affiliations:
  • AT&T Labs – Research;AT&T Labs – Research;CS Department, Columbia University;CS Department, Columbia University;Johns Hopkins University

  • Venue:
  • Proceedings of the 11th international conference on Security Protocols
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

There have been many efforts to anonymize traffic in traditional point-to-point networks. However, these techniques do not map directly onto wireless systems because the two types of networks have different properties. For example, whereas in wired networks adjacent communication links must know each others' addresses, wireless networks broadcast messages. Thus, an adversary may be able to obtain global information about network traffic. On the other hand, a wireless receiver's identity may not need to be known to anyone. We introduce Wireless Anonymous Routing (WAR).We describe a threat model for WAR and compare it to its wired counterpart. We show that traditional anonymity protocols are either insecure or perform poorly when applied to the wireless model, and we describe new protocols that preserve security with better performance.