Reliable privacy-preserving communications for wireless ad hoc networks

@article{Koh2015ReliablePC,
  title={Reliable privacy-preserving communications for wireless ad hoc networks},
  author={Jing Yang Koh and Joseph Chee Ming Teo and Derek Leong and Lawrence Wai-Choong Wong},
  journal={2015 IEEE International Conference on Communications (ICC)},
  year={2015},
  pages={6271-6276}
}
We present a phantom-receiver-based routing scheme to enhance the anonymity of each source-destination pair (or contextual privacy) while using an adjustable amount of overhead. We also study how traditional network coding and opportunistic routing can leak contextual privacy. We then incorporated both network coding and opportunistic routing into our scheme for better network performance and show how we mitigate its vulnerability. Contrary to prior works, we allow the destination to… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-4 OF 4 CITATIONS

Optimal Privacy-Preserving Probabilistic Routing for Wireless Networks

VIEW 5 EXCERPTS
CITES METHODS & BACKGROUND

Privacy-Preserving Routing for Wireless Network using OPERA

VIEW 1 EXCERPT
CITES BACKGROUND

Security and Privacy in Device-to-Device (D2D) Communication: A Review

VIEW 2 EXCERPTS
CITES BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-10 OF 16 REFERENCES

ANOC: Anonymous Network-Coding-Based Communication with Efficient Cooperation

VIEW 9 EXCERPTS
HIGHLY INFLUENTIAL

Protecting Location Privacy in Sensor Networks against a Global Eavesdropper

VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Network Coding Based Privacy Preservation against Traffic Analysis in Multi-Hop Wireless Networks

VIEW 7 EXCERPTS
HIGHLY INFLUENTIAL

A-WEOR: Communication Privacy Protection for Wireless Mesh Networks Using Encoded Opportunistic Routing

VIEW 10 EXCERPTS
HIGHLY INFLUENTIAL

A novel scheme for protecting receiver's location privacy in wireless sensor networks

VIEW 7 EXCERPTS
HIGHLY INFLUENTIAL

Wireless Sensor Network Energy Use While Tracking Secure Area Intrusions

  • Robert Hartwell
  • Computer Science
  • MILCOM 2013 - 2013 IEEE Military Communications Conference
  • 2013
VIEW 1 EXCERPT

Privacy-Preserving Location-Based On-Demand Routing in MANETs

VIEW 1 EXCERPT