@inproceedings{d4dd01bd907147388bcc564b30748fcb,
title = "A-WEOR: Communication privacy protection for wireless mesh networks using encoded opportunistic routing",
abstract = "Recent research in the physical and MAC models of IEEE 802.11 has shown that wireless nodes expose traffic patterns at PHY/MAC layers. Adversaries can easily utilize these patterns to derive the end-to-end communication relations using statistical traffic analysis attack. IEEE 802.11 provides MAC layer broadcast capabilities which can be used to protect the flow from such traffic analysis. In this paper, we present a novel approach A-WEOR, utilizing network coding and opportunistic routing to protect the communication patterns for wireless mesh networks. Our evaluation proves that A-WEOR is an efficient solution which achieves exceedingly superior anonymity compared to existing methodologies.",
keywords = "Anonymous routing, Network coding, Opportunistic routing",
author = "Nirav Shah and Dijiang Huang",
year = "2010",
month = jun,
day = "29",
doi = "10.1109/INFCOMW.2010.5466677",
language = "English (US)",
isbn = "9781424467396",
series = "Proceedings - IEEE INFOCOM",
booktitle = "INFOCOM 2010 - IEEE Conference on Computer Communications Workshops",
note = "IEEE Conference on Computer Communications Workshops, INFOCOM 2010 ; Conference date: 15-03-2010 Through 19-03-2010",
}