2012
DOI: 10.1109/jsac.2012.121018
|View full text |Cite
|
Sign up to set email alerts
|

ANOC: Anonymous Network-Coding-Based Communication with Efficient Cooperation

Abstract: Abstract-Practical wireless network coding (e.g., COPE) is a promising technique that can enhance the throughput of wireless networks. However, such a technique also bears a serious security drawback: it breaks the current privacy-preserving protocols (e.g., Onion Routing), since their operations conflict each other. As user privacy in wireless networks is highly valued nowadays, a new privacy-preserving scheme that can function with wireless network coding becomes indispensable.To address such a challenge, we… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 25 publications
(40 reference statements)
0
6
0
Order By: Relevance
“…• Cross-layer design [127], [128], [191], [192] in cooperative networks. Network coding appears in a number of categories within the framework of cooperative networking, namely in coding [137][138][139], power allocation [145], [148], energy harvesting [74], [151], two-way relaying [151], [161], cooperative transmission [154], channel access [174], [175], relayselection [163], [164] as well as in routing [177], [180], [181] categories, as portrayed in Fig. 4.…”
Section: B Cooperative Communications and Network Coding 1) Cooperative Communicationsmentioning
confidence: 99%
“…• Cross-layer design [127], [128], [191], [192] in cooperative networks. Network coding appears in a number of categories within the framework of cooperative networking, namely in coding [137][138][139], power allocation [145], [148], energy harvesting [74], [151], two-way relaying [151], [161], cooperative transmission [154], channel access [174], [175], relayselection [163], [164] as well as in routing [177], [180], [181] categories, as portrayed in Fig. 4.…”
Section: B Cooperative Communications and Network Coding 1) Cooperative Communicationsmentioning
confidence: 99%
“…In all, we differentiate between two levels of privacy: non‐observability and non‐linkability. Non‐observability aims to camouflage the communication, and this achieves the strongest guarantee of privacy , but it is not suitable for interactive audio/video chatting applications because such models involve padding dummy packets, which introduces overhead that jeopardizes the QoS requirements of multimedia applications , . Non‐linkability, on the other hand, prevents the revelation of the link between communicating users.…”
Section: System Designmentioning
confidence: 99%
“…Our approach modifies both these well known schemes and combines them together to work cooperatively while removing any conflicts sys-tematically. Some existing similar approaches employing network coding and achieving pri-vacy can be found in [18] and [19]. Authors in [20] introduce an enhanced scheme for network coding and promise even superior gains.…”
Section: ) Random Linear Network Codingmentioning
confidence: 99%