Mostra el registre d'ítem simple
On collaborative anonymous communications in lossy networks
dc.contributor.author | Rebollo-Monedero, David |
dc.contributor.author | Forné Muñoz, Jorge |
dc.contributor.author | Pallarès Segarra, Esteve |
dc.contributor.author | Parra-Arnau, Javier |
dc.contributor.author | Tripp Barba, Carolina |
dc.contributor.author | Urquiza Aguiar, Luis |
dc.contributor.author | Aguilar Igartua, Mónica |
dc.contributor.other | Universitat Politècnica de Catalunya. Departament d'Enginyeria Telemàtica |
dc.date.accessioned | 2013-05-30T17:26:32Z |
dc.date.created | 2013-05-17 |
dc.date.issued | 2013-05-17 |
dc.identifier.citation | Rebollo-Monedero, D. [et al.]. On collaborative anonymous communications in lossy networks. "Security and Communication Networks", 17 Maig 2013, núm. Special issue. |
dc.identifier.issn | 1939-0114 |
dc.identifier.uri | http://hdl.handle.net/2117/19464 |
dc.description.abstract | Message encryption does not prevent eavesdroppers from unveiling who is communicating with whom, when, or how frequently, a privacy risk wireless networks are particularly vulnerable to. The Crowds protocol, a well-established anonymous communication system, capitalizes on user collaboration to enforce sender anonymity. This work formulates a mathematical model of a Crowd-like protocol for anonymous communication in a lossy network, establishes quantifiable metrics of anonymity and quality of service (QoS), and theoretically characterizes the trade-off between them. The anonymity metric chosen follows the principle of measuring privacy as an attacker's estimation error. By introducing losses, we extend the applicability of the protocol beyond its original proposal. We quantify the intuition that anonymity comes at the expense of both delay and end-to-end losses. Aside from introducing losses in our model, another main difference with respect to the traditional Crowds is the focus on networks with stringent QoS requirements, for best effort anonymity, and the consequent elimination of the initial forwarding step. Beyond the mathematical solution, we illustrate a systematic methodology in our analysis of the protocol. This methodology includes a series of formal steps, from the establishment of quantifiable metrics all the way to the theoretical study of the privacy QoS trade-off. Copyright © 2013 John Wiley & Sons, Ltd. |
dc.language.iso | eng |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 Spain |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/es/ |
dc.subject | Àrees temàtiques de la UPC::Enginyeria de la telecomunicació::Telemàtica i xarxes d'ordinadors |
dc.subject.lcsh | Wireless LANs |
dc.subject.lcsh | Wireless communication systems |
dc.subject.other | Privacy |
dc.subject.other | Qos |
dc.title | On collaborative anonymous communications in lossy networks |
dc.type | Article |
dc.subject.lemac | Xarxes locals sense fil Wi-Fi |
dc.subject.lemac | Comunicació sense fil, Sistemes de |
dc.contributor.group | Universitat Politècnica de Catalunya. SERTEL - Serveis Telemàtics |
dc.identifier.doi | 10.1002/sec.793 |
dc.description.peerreviewed | Peer Reviewed |
dc.relation.publisherversion | http://onlinelibrary.wiley.com/doi/10.1002/sec.793/abstract |
dc.rights.access | Restricted access - publisher's policy |
local.identifier.drac | 12150020 |
dc.description.version | Postprint (published version) |
dc.date.lift | 10000-01-01 |
local.citation.author | Rebollo-Monedero, D.; Forne, J.; Pallares, E.; Parra-Arnau, J.; Tripp, C.; Urquiza, L.; Aguilar, M. |
local.citation.publicationName | Security and Communication Networks |
local.citation.number | Special issue |
Fitxers d'aquest items
Aquest ítem apareix a les col·leccions següents
-
Articles de revista [480]
-
Articles de revista [56]