Abstract-We design and evaluate a traffic anonymization protocol for wireless networks, aiming to protect against computationally powerful adversaries. Our protocol builds on recent key-generation techniques, that leverage intrinsic properties of the wireless together with standard coding techniques. We show how to exploit the security properties of such keys to design a Torlike anonymity network, without making any assumptions about the computational capabilities of an adversary. Our analysis and evaluation on simulated ad-hoc wireless networks, shows that our protocol achieves a level of anonymity comparable to the level of the Tor network.
I. INTRODUCTIONAs a significantly large fraction of our personal and sensitive data is carried out on wireless systems, encryption and anonymity are in many cases essential. The Tor anonymity network [1] is an overlay network that combines Onion Routing with a light-weight system design for Internet traffic anonymization, and it is rapidly becoming the prevalent approach to anonymity today. In the core of its design, basic cryptographic primitives are used, e.g., the Diffie-Hellman key-agreement, RSA and AES encryption. The security of such cryptographic schemes relies on computational-hardness assumptions: an adversary cannot breach security in useful time, since she does not possess the necessary computational power. We ask the question: can we design an alternative, Torlike communication scheme for wireless networks, that offers a level of anonymity comparable to the level of anonymity that Tor does, without assuming anything about the computational and memory capabilities of an adversary?Recent work has shown that, by exploiting inherent wireless network properties, such as channel variability and noise, along with standard network coding techniques, we can fast and reliably create keys among network nodes, where the security of the keys does not rely on the computational limitations of an adversary. Algorithms that create such unconditionally secure keys were studied theoretically in [2] and translated into practical protocols for 1-hop networks in [3], and for multi-hop networks in [4]. We briefly summarize this work and, building on it, we show how we can, using the created keys and their properties, design a Tor-like anonymization network.Similarly to the Tor anonymity approach, our goal is to enable nodes connect to the Internet, while hiding their identity within a set of potential users. Tor achieves anonymity by bouncing encrypted communications around a distributed network of relays; we similarly bounce encrypted communications among the wireless network nodes. In our use-case