scispace - formally typeset
Proceedings ArticleDOI

Achieving privacy in mesh networks

Reads0
Chats0
TLDR
This paper designs private routing algorithm that used "Onion", i.e., layered encryption, to hide routing information and explores special ring topology that fits the investigated network scenario, to preserve a certain level of privacy against a global adversary.
Abstract
Mesh network is vulnerable to privacy attacks because of the open medium property of wireless channel, the fixed topology, and the limited network size. Traditional anonymous routing algorithm cannot be directly applied to Mesh network, because they do not defend global attackers. In this paper we design private routing algorithm that used "Onion", i.e., layered encryption, to hide routing information. In addition, we explore special ring topology that fits the investigated network scenario, to preserve a certain level of privacy against a global adversary.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

AMI threats, intrusion detection requirements and deployment recommendations

TL;DR: The type of information that would be required to effectively detect attacks is shown and the widest coverage in monitoring the attacks can be provided by a hybrid sensing infrastructure that uses both a centralized intrusion detection system and embedded meter sensors.
Proceedings ArticleDOI

An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding

TL;DR: A novel pri- vacy-preserving scheme against traffic analysis in network coding with homomorphic encryption operation on Global Encoding Vectors (GEVs), which keeps the random coding feature and each sink can recover the source packets by inverting the GEVs with a very high probability.
Journal ArticleDOI

Mitigating selective forwarding attacks with a channel-aware approach in WMNS

TL;DR: A channel aware detection (CAD) algorithm is developed that can effectively identify the selective forwarding misbehavior from the normal channel losses in wireless mesh networks known as selective forwarding attack.
Journal ArticleDOI

Network Coding Based Privacy Preservation against Traffic Analysis in Multi-Hop Wireless Networks

TL;DR: This paper proposes a novel network coding based privacy-preserving scheme against traffic analysis in multi-hop wireless networks, with homomorphic encryption on Global Encoding Vectors (GEVs), which offers two significant privacy- Preserving features, packet flow untraceability and message content confidentiality.
Journal ArticleDOI

PASER: Secure and Efficient Routing Approach for Airborne Mesh Networks

TL;DR: This work presents the position-aware, secure, and efficient mesh routing approach (PASER), which prevents more attacks than the IEEE 802.11sΓi security mechanisms and the well-known, secure routing protocol ARAN, without making restrictive assumptions.
References
More filters
Proceedings ArticleDOI

Ad-hoc on-demand distance vector routing

TL;DR: An ad-hoc network is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure and the proposed routing algorithm is quite suitable for a dynamic self starting network, as required by users wishing to utilize ad- hoc networks.

Dynamic Source Routing in Ad Hoc Wireless Networks.

TL;DR: In this article, the authors present a protocol for routing in ad hoc networks that uses dynamic source routing, which adapts quickly to routing changes when host movement is frequent, yet requires little or no overhead during periods in which hosts move less frequently.
Book ChapterDOI

Dynamic Source Routing in Ad Hoc Wireless Networks

TL;DR: This paper presents a protocol for routing in ad hoc networks that uses dynamic source routing that adapts quickly to routing changes when host movement is frequent, yet requires little or no overhead during periods in which hosts move less frequently.
Journal ArticleDOI

k -anonymity: a model for protecting privacy

TL;DR: The solution provided in this paper includes a formal protection model named k-anonymity and a set of accompanying policies for deployment and examines re-identification attacks that can be realized on releases that adhere to k- anonymity unless accompanying policies are respected.
Journal ArticleDOI

Untraceable electronic mail, return addresses, and digital pseudonyms

TL;DR: A technique based on public key cryptography is presented that allows an electronic mail system to hide who a participant communicates with as well as the content of the communication - in spite of an unsecured underlying telecommunication system.
Related Papers (5)